CVE-2024-50630

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to obtain administrator credentials in Synology Drive Server due to missing authentication for a critical web API function. Attackers can exploit this to gain administrative access to the system. All organizations running vulnerable versions of Synology Drive Server are affected.

💻 Affected Systems

Products:
  • Synology Drive Server
Versions: Before 3.0.4-12699, 3.2.1-23280, 3.5.0-26085 and 3.5.1-26102
Operating Systems: Synology DSM
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. The webapi component is typically enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Synology Drive Server with administrative access, potential data exfiltration, ransomware deployment, and lateral movement to connected systems.

🟠

Likely Case

Attackers obtain administrator credentials and gain full control over Synology Drive Server, accessing all stored files and user data.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to vulnerable systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

The advisory mentions 'unspecified vectors' but authentication bypass suggests attackers need to discover the vulnerable endpoint and craft appropriate requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.4-12699, 3.2.1-23280, 3.5.0-26085, or 3.5.1-26102 and later

Vendor Advisory: https://www.synology.com/en-global/security/advisory/Synology_SA_24_21

Restart Required: No

Instructions:

1. Log into DSM as administrator. 2. Open Package Center. 3. Find Synology Drive Server. 4. Click Update if available. 5. Alternatively, download the patched version from Synology's website and manually install.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to Synology Drive Server web interface using firewall rules

Disable WebAPI if Not Needed

all

Temporarily disable the webapi component if not required for operations

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Synology Drive Server from untrusted networks
  • Enable multi-factor authentication for all administrator accounts and monitor for suspicious login attempts

🔍 How to Verify

Check if Vulnerable:

Check Synology Drive Server version in Package Center or via SSH: synopkg version DriveServer

Check Version:

synopkg version DriveServer

Verify Fix Applied:

Verify version is 3.0.4-12699, 3.2.1-23280, 3.5.0-26085, 3.5.1-26102 or later

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts to webapi endpoints
  • Administrator credential access from unexpected IP addresses
  • Failed authentication attempts followed by successful admin access

Network Indicators:

  • Unusual HTTP requests to /webapi/* endpoints from external IPs
  • Traffic patterns suggesting credential harvesting

SIEM Query:

source="synology" AND (event="authentication" OR event="api_access") AND (user="admin" OR user="administrator") AND src_ip NOT IN [trusted_ips]

🔗 References

📤 Share & Export