CVE-2024-11398

8.1 HIGH

📋 TL;DR

This path traversal vulnerability in Synology Router Manager allows authenticated remote attackers to delete arbitrary files on affected systems by exploiting improper path validation in the OTP reset functionality. It affects Synology routers running SRM versions before 1.3.1-9346-9. Attackers need valid credentials to exploit this vulnerability.

💻 Affected Systems

Products:
  • Synology Router Manager (SRM)
Versions: All versions before 1.3.1-9346-9
Operating Systems: Synology Router Manager OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Synology routers with SRM installed. Requires authenticated access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could delete critical system files, configuration files, or user data, potentially causing complete system failure, data loss, or persistent compromise by removing security controls.

🟠

Likely Case

Attackers with valid credentials could delete router configuration files, logs, or user data, leading to service disruption, loss of network connectivity, or removal of evidence.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to files accessible by the authenticated user's permissions, but still represents unauthorized file deletion.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access. Specific exploitation vectors are unspecified in the advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: SRM 1.3.1-9346-9 or later

Vendor Advisory: https://www.synology.com/en-global/security/advisory/Synology_SA_24_03

Restart Required: No

Instructions:

1. Log into SRM web interface. 2. Navigate to Control Panel > Update & Restore. 3. Click 'Update' and follow prompts to install SRM 1.3.1-9346-9 or later. 4. Verify update completes successfully.

🔧 Temporary Workarounds

Disable OTP reset functionality

all

Temporarily disable the OTP reset feature if not required

Restrict administrative access

all

Limit administrative access to trusted IP addresses only

🧯 If You Can't Patch

  • Implement strict access controls and limit administrative accounts to essential personnel only
  • Enable comprehensive logging and monitor for unauthorized file deletion attempts

🔍 How to Verify

Check if Vulnerable:

Check SRM version in Control Panel > Info Center > DSM/SRM. If version is below 1.3.1-9346-9, system is vulnerable.

Check Version:

ssh admin@router-ip 'cat /etc.defaults/VERSION'

Verify Fix Applied:

Verify SRM version is 1.3.1-9346-9 or higher in Control Panel > Info Center > DSM/SRM.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file deletion events in system logs
  • Multiple failed OTP reset attempts followed by successful attempts
  • Administrative access from unexpected IP addresses

Network Indicators:

  • HTTP requests to OTP reset endpoints with unusual path parameters
  • Increased traffic to administrative interfaces

SIEM Query:

source="srm-logs" AND (event="file_delete" OR uri="/otp/reset") AND NOT user="system"

🔗 References

📤 Share & Export