Some Synology products impacted by recently disclosed OpenSSL flaws

Taiwan vendor Synology announced that recently disclosed vulnerabilities (CVE-2021-3711 and CVE-2021-3712) in the OpenSSL impact some of its products.

Taiwanese company Synology revealed that the recently disclosed remote code execution (RCE) and denial-of-service (DoS) OpenSSL vulnerabilities (CVE-2021-3711 and CVE-2021-3712) impact some of its products.

“Multiple vulnerabilities allow remote attackers to conduct denial-of-service attack or possibly execute arbitrary code via a susceptible version of Synology DiskStation Manager (DSM), Synology Router Manager (SRM), VPN Plus Server or VPN Server.” reads the advisory published by the company.

The affected Synology products are:

ProductSeverityFixed Release AvailabilityDSM 7.0ImportantOngoingDSM 6.2ModerateOngoingDSM UCModerateOngoingSkyNASModeratePendingVS960HDModeratePendingSRM 1.2ModerateOngoingVPN Plus ServerImportantOngoingVPN ServerModerateOngoingThe CVE-2021-3711 is a high-severity buffer overflow flaw that could allow an attacker to change an application’s behavior or cause the app to crash. The vulnerability ties the decryption of SM2 encrypted data, the changes depend on the targeted application and data it maintains (i.e. credentials) in the heap while the issue is exploited.

The CVE-2021-3712 is a medium-severity vulnerability that can be exploited by attackers to trigger a denial-of-service (DoS) condition. The flaw could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext).

Synology is expected to address both flaws with security updates, but it does not provide an estimated timeline for their release. Synology is not aware of attacks in the wild exploiting the above vulnerabilities.

Recently the vendor also published another advisory to warn of vulnerabilities in DiskStation Manager.

“Multiple vulnerabilities allow remote authenticated users to execute arbitrary commands, or remote attackers to write arbitrary files via a susceptible version of DiskStation Manager (DSM).” reads the advisory published by the company.

Below is the list of affected products:

ProductSeverityFixed Release AvailabilityDSM 7.0ImportantOngoingDSM 6.2ImportantUpgrade to 6.2.4-25556-2 or above.DSM UCModeratePendingSkyNASImportantPendingVS960HDModeratePendingEarly this month, the company PSIRT warned customers that the StealthWorker botnet is conducting brute-force attacks in an attempt to implant ransomware. Once compromised the device, threat actors employed it in a botnet used in attacks aimed at Linux systems, including Synology NAS.

Follow me on Twitter: @securityaffairs and Facebook

try {
window._mNHandle.queue.push(function (){
window._mNDetails.loadTag(“816788371”, “300×250”, “816788371”);
});
}
catch (error) {}

try {
window._mNHandle.queue.push(function (){
window._mNDetails.loadTag(“816788371”, “300×250”, “816788371”);
});
}
catch (error) {}
Pierluigi Paganini

(SecurityAffairs – hacking, OpenSSL)

The post Some Synology products impacted by recently disclosed OpenSSL flaws appeared first on Security Affairs.