CVE-2024-29228

7.7 HIGH

📋 TL;DR

This vulnerability allows remote authenticated users to access sensitive information through the GetStmUrlPath webapi component in Synology Surveillance Station. It affects all authenticated users of Synology Surveillance Station installations before patched versions. The missing authorization check enables unauthorized data access.

💻 Affected Systems

Products:
  • Synology Surveillance Station
Versions: All versions before 9.2.0-9289 and 9.2.0-11289
Operating Systems: Synology DSM
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations with default configurations. Requires authenticated access but no special privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive surveillance data, camera feeds, configuration details, or user information, potentially leading to privacy violations, surveillance bypass, or further network compromise.

🟠

Likely Case

Authenticated users (including low-privileged accounts) can access surveillance data or system information they shouldn't have permission to view, violating data confidentiality.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to unauthorized data access within the surveillance system compartment.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access but no special privileges. Exploitation vectors unspecified in advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.2.0-9289 or 9.2.0-11289

Vendor Advisory: https://www.synology.com/en-global/security/advisory/Synology_SA_24_04

Restart Required: Yes

Instructions:

1. Log into DSM as administrator. 2. Open Package Center. 3. Find Surveillance Station. 4. Click Update if available. 5. Alternatively, download from Synology website and manually install. 6. Restart Surveillance Station service.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to Surveillance Station to trusted networks only

Access Control Tightening

all

Review and minimize authenticated user accounts, implement least privilege

🧯 If You Can't Patch

  • Isolate Surveillance Station on separate VLAN with strict firewall rules
  • Implement application-level monitoring for unauthorized access attempts to GetStmUrlPath endpoint

🔍 How to Verify

Check if Vulnerable:

Check Surveillance Station version in Package Center or via SSH: synopkg version SurveillanceStation

Check Version:

synopkg version SurveillanceStation

Verify Fix Applied:

Confirm version is 9.2.0-9289 or higher, or 9.2.0-11289 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to GetStmUrlPath API endpoint
  • Multiple failed authorization attempts followed by successful access

Network Indicators:

  • HTTP requests to /webapi/GetStmUrlPath from unexpected sources
  • Traffic spikes to surveillance API endpoints

SIEM Query:

source="surveillance_logs" AND (uri_path="/webapi/GetStmUrlPath" OR api_call="GetStmUrlPath")

🔗 References

📤 Share & Export