CVE-2024-29241

9.9 CRITICAL

📋 TL;DR

A missing authorization vulnerability in Synology Surveillance Station's webapi component allows authenticated users to perform unauthorized actions. Attackers can read non-sensitive information, write sensitive DSM configurations, and reboot or shutdown NAS devices. This affects Synology Surveillance Station versions before 9.2.0-9289 and 9.2.0-11289.

💻 Affected Systems

Products:
  • Synology Surveillance Station
Versions: Versions before 9.2.0-9289 and 9.2.0-11289
Operating Systems: Synology DiskStation Manager (DSM)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with Surveillance Station installed. Requires authenticated access to the web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could reboot or shutdown critical NAS systems, causing service disruption, and modify sensitive DSM configurations to enable further attacks or persistence.

🟠

Likely Case

Authenticated users (including compromised accounts) can access unauthorized information and modify system configurations, potentially leading to privilege escalation or system disruption.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to authorized users within the isolated network segment.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but no special privileges. Attack vectors are unspecified in the advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.2.0-9289 or 9.2.0-11289

Vendor Advisory: https://www.synology.com/en-global/security/advisory/Synology_SA_24_04

Restart Required: Yes

Instructions:

1. Log into DSM as administrator. 2. Open Package Center. 3. Find Surveillance Station. 4. Click Update if available. 5. Alternatively, download the update from Synology's website and manually install via Package Center > Manual Install.

🔧 Temporary Workarounds

Restrict Network Access

all

Limit access to Surveillance Station web interface to trusted IPs only.

Implement Strong Authentication

all

Enforce multi-factor authentication and strong password policies for all Surveillance Station accounts.

🧯 If You Can't Patch

  • Isolate affected NAS devices from internet and restrict internal network access to authorized users only.
  • Implement strict access controls and monitor for unauthorized configuration changes or reboot attempts.

🔍 How to Verify

Check if Vulnerable:

Check Surveillance Station version in DSM Package Center or via SSH: synopkg version SurveillanceStation

Check Version:

synopkg version SurveillanceStation

Verify Fix Applied:

Confirm version is 9.2.0-9289 or higher, or 9.2.0-11289 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized configuration changes in DSM logs
  • Unexpected system reboots or shutdowns
  • Unusual webapi access patterns in Surveillance Station logs

Network Indicators:

  • Unusual HTTP requests to Surveillance Station webapi endpoints from authenticated users

SIEM Query:

source="*synology*" AND (event="reboot" OR event="shutdown" OR event="config_change") AND user!="admin"

🔗 References

📤 Share & Export