CVE-2024-10445

4.3 MEDIUM

📋 TL;DR

This CVE describes an improper certificate validation vulnerability in Synology BeeStation OS and DiskStation Manager update functionality. It allows remote attackers to write limited files via unspecified vectors. Affected users are those running vulnerable versions of Synology BeeStation OS (BSM) before 1.1-65374 and Synology DiskStation Manager (DSM) before specified versions.

💻 Affected Systems

Products:
  • Synology BeeStation OS (BSM)
  • Synology DiskStation Manager (DSM)
Versions: BSM before 1.1-65374; DSM before 6.2.4-25556-8, 7.1.1-42962-7, 7.2-64570-4, 7.2.1-69057-6, 7.2.2-72806-1
Operating Systems: Synology proprietary OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the update functionality specifically. Systems with update services exposed to untrusted networks are at higher risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attackers could write malicious files to the system, potentially leading to limited file system manipulation, configuration changes, or preparation for further attacks.

🟠

Likely Case

Attackers could write limited files to specific locations, potentially affecting system integrity or preparing for privilege escalation.

🟢

If Mitigated

With proper network segmentation and access controls, impact would be limited to isolated network segments.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

The advisory mentions 'remote attackers' but doesn't specify authentication requirements. The 'unspecified vectors' suggests exploitation details aren't publicly disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: BSM 1.1-65374 or later; DSM 6.2.4-25556-8, 7.1.1-42962-7, 7.2-64570-4, 7.2.1-69057-6, 7.2.2-72806-1 or later

Vendor Advisory: https://www.synology.com/en-global/security/advisory/Synology_SA_24_20, https://www.synology.com/en-global/security/advisory/Synology_SA_24_23

Restart Required: Yes

Instructions:

1. Log into Synology DSM/BeeStation web interface. 2. Go to Control Panel > Update & Restore. 3. Click 'Update DSM' or 'Update BeeStation OS'. 4. Follow prompts to install latest version. 5. System will restart automatically.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Synology update services from untrusted networks.

Disable Automatic Updates

all

Temporarily disable automatic updates until patched, then manually update from trusted sources.

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure of Synology devices to untrusted networks.
  • Monitor file system changes and update-related network traffic for suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check current version in DSM/BeeStation web interface under Control Panel > Info Center > DSM Version or BeeStation OS Version.

Check Version:

ssh admin@synology_ip 'cat /etc.defaults/VERSION' or check web interface

Verify Fix Applied:

Verify version matches or exceeds patched versions: BSM >= 1.1-65374; DSM >= appropriate version for your release.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file write operations in system logs
  • Failed update attempts from unexpected sources
  • Certificate validation errors in update logs

Network Indicators:

  • Unusual update traffic patterns
  • Update requests from unexpected IP addresses

SIEM Query:

source="synology_logs" AND (event_type="file_write" OR event_type="update_failure")

🔗 References

📤 Share & Export