CVE-2024-50631

7.5 HIGH

📋 TL;DR

This SQL injection vulnerability in Synology Drive Server's system syncing daemon allows remote attackers to execute write-only SQL commands against the database. It affects all Synology Drive Server versions before the patched releases, potentially compromising data integrity.

💻 Affected Systems

Products:
  • Synology Drive Server
Versions: All versions before 3.0.4-12699, 3.2.1-23280, 3.5.0-26085, and 3.5.1-26102
Operating Systems: Synology DSM
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the system syncing daemon component specifically. Requires network access to the Drive Server service.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could manipulate or corrupt database content, potentially leading to data loss, service disruption, or privilege escalation through database manipulation.

🟠

Likely Case

Data tampering or corruption in the Drive Server database, potentially affecting file metadata, user permissions, or synchronization data.

🟢

If Mitigated

Limited to write operations only, preventing data exfiltration but still allowing data manipulation if exploited.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Vulnerability is limited to write operations only (no data exfiltration). Attack vectors are unspecified in the advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.4-12699, 3.2.1-23280, 3.5.0-26085, or 3.5.1-26102 (depending on your version track)

Vendor Advisory: https://www.synology.com/en-global/security/advisory/Synology_SA_24_21

Restart Required: No

Instructions:

1. Log into DSM as administrator. 2. Open Package Center. 3. Find Synology Drive Server. 4. Click Update if available. 5. Alternatively, download the patched version from Synology's website and manually install.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Synology Drive Server to trusted networks only

Firewall Rules

all

Implement firewall rules to limit access to Drive Server ports (default 6690)

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure
  • Monitor database logs for unusual write operations or SQL errors

🔍 How to Verify

Check if Vulnerable:

Check the installed version of Synology Drive Server in Package Center

Check Version:

No CLI command; check via DSM Package Center interface

Verify Fix Applied:

Verify the version number matches or exceeds the patched versions listed in the advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in Drive Server logs
  • Unexpected database write operations

Network Indicators:

  • Unusual traffic patterns to Drive Server port 6690
  • SQL injection patterns in network traffic

SIEM Query:

source="synology-drive" AND (error OR sql OR injection)

🔗 References

📤 Share & Export