CVE-2023-3699
📋 TL;DR
An Improper Privilege Management vulnerability in ASUSTOR Data Master (ADM) allows unprivileged local users to modify storage device configurations. This affects ADM versions 4.0.6.RIS1, 4.1.0 and below, as well as ADM 4.2.2.RI61 and below. Attackers could potentially disrupt storage operations or gain unauthorized access to data.
💻 Affected Systems
- ASUSTOR Data Master (ADM)
📦 What is this software?
Data Master by Asustor
⚠️ Risk & Real-World Impact
Worst Case
An attacker could reconfigure storage devices to cause data loss, disrupt operations, or gain unauthorized access to sensitive data stored on the NAS device.
Likely Case
Local users without proper privileges could modify storage configurations, potentially causing service disruption or unauthorized access to data partitions.
If Mitigated
With proper access controls and monitoring, impact would be limited to configuration changes that could be detected and reverted.
🎯 Exploit Status
Exploitation requires local access but minimal technical skill. No public exploit code has been identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: ADM 4.0.6.RIS2, ADM 4.1.1, ADM 4.2.3.RI62 and above
Vendor Advisory: https://www.asustor.com/security/security_advisory_detail?id=29
Restart Required: Yes
Instructions:
1. Log into ADM web interface. 2. Navigate to Settings > ADM Update. 3. Check for updates and install the latest version. 4. Reboot the NAS after update completes.
🔧 Temporary Workarounds
Restrict Local User Access
allLimit local user accounts to only trusted personnel and implement strict access controls.
Monitor Storage Configuration Changes
linuxImplement logging and monitoring for storage configuration modifications.
🧯 If You Can't Patch
- Implement strict access controls to limit local user accounts to only essential personnel
- Enable detailed logging of storage configuration changes and monitor for unauthorized modifications
🔍 How to Verify
Check if Vulnerable:
Check ADM version via web interface: Settings > ADM Update > Current Version
Check Version:
ssh admin@nas-ip 'cat /etc/nas.conf | grep version'
Verify Fix Applied:
Verify ADM version is 4.0.6.RIS2, 4.1.1, 4.2.3.RI62 or higher
📡 Detection & Monitoring
Log Indicators:
- Unauthorized storage configuration changes
- Unexpected user account modifying storage settings
Network Indicators:
- Unusual storage-related API calls from non-admin accounts
SIEM Query:
source="asustor_nas" AND (event="storage_config_change" AND user!="admin")