CVE-2022-22681

8.1 HIGH

📋 TL;DR

This session fixation vulnerability in Synology Photo Station allows attackers to bypass access controls by manipulating session identifiers. Attackers could gain unauthorized access to photo management functions. All users running vulnerable versions of Synology Photo Station are affected.

💻 Affected Systems

Products:
  • Synology Photo Station
Versions: Versions before 6.8.16-3506
Operating Systems: Synology DSM
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Photo Station installations on Synology NAS devices.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to Photo Station, potentially accessing, modifying, or deleting all photos and user data, and using the system as a foothold for further attacks.

🟠

Likely Case

Unauthorized access to photo galleries, potential data exposure, and privilege escalation within the Photo Station application.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication, and monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires some authentication interaction but specific vectors are unspecified in the advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.8.16-3506 and later

Vendor Advisory: https://www.synology.com/security/advisory/Synology_SA_21_26

Restart Required: Yes

Instructions:

1. Log into DSM as administrator. 2. Open Package Center. 3. Find Photo Station. 4. Click Update if available. 5. Alternatively, download latest version from Synology website. 6. Install update. 7. Restart Photo Station service.

🔧 Temporary Workarounds

Disable Photo Station

linux

Temporarily disable Photo Station package if not essential

sudo synopkg stop PhotoStation
sudo synopkg uninstall PhotoStation

Network Access Restriction

linux

Restrict access to Photo Station via firewall rules

iptables -A INPUT -p tcp --dport 80,443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80,443 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Photo Station from untrusted networks
  • Enable detailed logging and monitor for unusual authentication patterns

🔍 How to Verify

Check if Vulnerable:

Check Photo Station version in DSM Package Center or via SSH: synopkg version PhotoStation

Check Version:

synopkg version PhotoStation

Verify Fix Applied:

Verify version is 6.8.16-3506 or higher: synopkg version PhotoStation | grep -E '6.8.16-3506|^[7-9]'

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful login from same IP
  • Session ID reuse from different IP addresses
  • Unusual access patterns to admin functions

Network Indicators:

  • HTTP requests with manipulated session cookies
  • Unusual traffic to Photo Station authentication endpoints

SIEM Query:

source="photo_station.log" (event="login" AND result="success") | stats count by src_ip, user | where count > threshold

🔗 References

📤 Share & Export