CVE-2024-10443

9.8 CRITICAL

📋 TL;DR

This CVE describes an OS command injection vulnerability in Synology's photo management applications. Remote attackers can execute arbitrary commands on affected systems, potentially gaining full control. Users of Synology BeePhotos and Synology Photos with vulnerable versions are affected.

💻 Affected Systems

Products:
  • Synology BeePhotos
  • Synology Photos
Versions: BeePhotos before 1.0.2-10026 and 1.1.0-10053; Photos before 1.6.2-0720 and 1.7.0-0795
Operating Systems: Synology DSM
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both BeePhotos and Photos applications on Synology NAS devices. The vulnerability is in the Task Manager component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install malware, steal data, pivot to other systems, or deploy ransomware.

🟠

Likely Case

Unauthorized access to the NAS system, data exfiltration, and installation of backdoors or cryptocurrency miners.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege, and monitoring are in place, though system integrity may still be compromised.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The advisory mentions 'remote attackers' and CVSS 9.8 suggests network-accessible, unauthenticated exploitation is likely possible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: BeePhotos 1.0.2-10026 or 1.1.0-10053; Photos 1.6.2-0720 or 1.7.0-0795

Vendor Advisory: https://www.synology.com/en-global/security/advisory/Synology_SA_24_18, https://www.synology.com/en-global/security/advisory/Synology_SA_24_19

Restart Required: Yes

Instructions:

1. Log into DSM as administrator. 2. Open Package Center. 3. Find BeePhotos or Photos. 4. Click Update if available. 5. Alternatively, manually download and install the patched version from Synology's website. 6. Restart the application or NAS if prompted.

🔧 Temporary Workarounds

Disable vulnerable applications

linux

Temporarily disable BeePhotos and Photos until patching is possible

Open Package Center > Select BeePhotos/Photos > Click Stop

Network isolation

all

Restrict network access to the NAS using firewall rules

Configure firewall to block external access to NAS management ports

🧯 If You Can't Patch

  • Isolate the NAS from the internet and restrict access to trusted internal networks only
  • Implement strict network segmentation and monitor for unusual outbound connections

🔍 How to Verify

Check if Vulnerable:

Check installed version in Package Center or via SSH: synopkg version BeePhotos or synopkg version Photos

Check Version:

synopkg version BeePhotos; synopkg version Photos

Verify Fix Applied:

Confirm version matches or exceeds patched versions: BeePhotos >=1.0.2-10026 or >=1.1.0-10053; Photos >=1.6.2-0720 or >=1.7.0-0795

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Unexpected process creation from web services
  • Failed authentication attempts followed by successful exploitation

Network Indicators:

  • Unexpected outbound connections from NAS
  • Suspicious inbound traffic to web management ports
  • Command and control beaconing patterns

SIEM Query:

source="synology-nas" AND (event="command_execution" OR process="unexpected")

🔗 References

📤 Share & Export