CVE-2023-3699

8.7 HIGH

📋 TL;DR

An Improper Privilege Management vulnerability in ASUSTOR Data Master (ADM) allows unprivileged local users to modify storage device configurations. This affects ADM versions 4.0.6.RIS1, 4.1.0 and below, as well as ADM 4.2.2.RI61 and below. Attackers could potentially disrupt storage operations or gain unauthorized access to data.

💻 Affected Systems

Products:
  • ASUSTOR Data Master (ADM)
Versions: ADM 4.0.6.RIS1, 4.1.0 and below; ADM 4.2.2.RI61 and below
Operating Systems: ASUSTOR ADM (Linux-based NAS OS)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all default configurations of vulnerable ADM versions. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could reconfigure storage devices to cause data loss, disrupt operations, or gain unauthorized access to sensitive data stored on the NAS device.

🟠

Likely Case

Local users without proper privileges could modify storage configurations, potentially causing service disruption or unauthorized access to data partitions.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to configuration changes that could be detected and reverted.

🌐 Internet-Facing: LOW - This requires local access to the system, though remote exploitation might be possible if combined with other vulnerabilities.
🏢 Internal Only: HIGH - This vulnerability specifically affects local users, making internal threats particularly dangerous.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but minimal technical skill. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ADM 4.0.6.RIS2, ADM 4.1.1, ADM 4.2.3.RI62 and above

Vendor Advisory: https://www.asustor.com/security/security_advisory_detail?id=29

Restart Required: Yes

Instructions:

1. Log into ADM web interface. 2. Navigate to Settings > ADM Update. 3. Check for updates and install the latest version. 4. Reboot the NAS after update completes.

🔧 Temporary Workarounds

Restrict Local User Access

all

Limit local user accounts to only trusted personnel and implement strict access controls.

Monitor Storage Configuration Changes

linux

Implement logging and monitoring for storage configuration modifications.

🧯 If You Can't Patch

  • Implement strict access controls to limit local user accounts to only essential personnel
  • Enable detailed logging of storage configuration changes and monitor for unauthorized modifications

🔍 How to Verify

Check if Vulnerable:

Check ADM version via web interface: Settings > ADM Update > Current Version

Check Version:

ssh admin@nas-ip 'cat /etc/nas.conf | grep version'

Verify Fix Applied:

Verify ADM version is 4.0.6.RIS2, 4.1.1, 4.2.3.RI62 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized storage configuration changes
  • Unexpected user account modifying storage settings

Network Indicators:

  • Unusual storage-related API calls from non-admin accounts

SIEM Query:

source="asustor_nas" AND (event="storage_config_change" AND user!="admin")

🔗 References

📤 Share & Export