CVE-2024-47264

4.9 MEDIUM

📋 TL;DR

This path traversal vulnerability in Synology Active Backup for Business allows authenticated administrators to delete arbitrary files on the system. It affects all versions before 2.7.1-13234, 2.7.1-23234, and 2.7.1-3234. Attackers with admin credentials can exploit this to delete critical system files.

💻 Affected Systems

Products:
  • Synology Active Backup for Business
Versions: All versions before 2.7.1-13234, 2.7.1-23234, and 2.7.1-3234
Operating Systems: Synology DSM
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator privileges to exploit. Only affects systems with Active Backup for Business installed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical OS files, configuration files, or backup data, leading to system instability, data loss, or service disruption.

🟠

Likely Case

Targeted deletion of specific files to disrupt operations, delete evidence, or remove security controls, potentially enabling further attacks.

🟢

If Mitigated

Limited impact if proper access controls and monitoring are in place, with only authorized administrators able to exploit and logs capturing the activity.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator credentials. The unspecified vectors suggest the exact method isn't publicly documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.7.1-13234, 2.7.1-23234, or 2.7.1-3234

Vendor Advisory: https://www.synology.com/en-global/security/advisory/Synology_SA_25_02

Restart Required: Yes

Instructions:

1. Log into DSM as administrator. 2. Open Package Center. 3. Find Active Backup for Business. 4. Click Update if available. 5. Alternatively, download the latest version from Synology's website and manually install. 6. Restart the service or system as prompted.

🔧 Temporary Workarounds

Restrict Administrator Access

all

Limit the number of administrator accounts and implement strict access controls.

Monitor File Deletion Events

linux

Enable auditing for file deletion operations on critical paths.

🧯 If You Can't Patch

  • Implement strict least-privilege access controls for administrator accounts
  • Enable comprehensive logging and monitoring for file deletion activities

🔍 How to Verify

Check if Vulnerable:

Check the Active Backup for Business version in DSM Package Center. If version is below 2.7.1-13234, 2.7.1-23234, or 2.7.1-3234, the system is vulnerable.

Check Version:

Check via DSM web interface: Package Center > Installed > Active Backup for Business

Verify Fix Applied:

Confirm the installed version is 2.7.1-13234, 2.7.1-23234, or 2.7.1-3234 in Package Center.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file deletion events from Active Backup processes
  • Administrator account performing unexpected file operations

Network Indicators:

  • HTTP requests to Active Backup endpoints with path traversal patterns

SIEM Query:

source="synology" AND (event_type="file_delete" OR action="delete") AND process="activebackup" AND path CONTAINS ".."

🔗 References

📤 Share & Export