CVE-2025-13052

5.9 MEDIUM

📋 TL;DR

This vulnerability allows attackers to perform man-in-the-middle attacks against SMTP email notifications in ASUSTOR ADM systems by exploiting improper TLS/SSL certificate validation in msmtp. Sensitive SMTP information can be intercepted when emails are sent. Affected systems include ASUSTOR ADM versions 4.1.0 through 4.3.3.RKD2 and 5.0.0 through 5.1.0.RN42.

💻 Affected Systems

Products:
  • ASUSTOR ADM
Versions: 4.1.0 through 4.3.3.RKD2 and 5.0.0 through 5.1.0.RN42
Operating Systems: ASUSTOR ADM Linux-based OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using msmtp for SMTP notifications. Requires SMTP notification feature to be configured and used.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers intercept all SMTP traffic including authentication credentials, email content, and potentially gain access to email accounts or internal systems.

🟠

Likely Case

Interception of SMTP authentication credentials and email content during transmission between vulnerable systems and SMTP servers.

🟢

If Mitigated

No data exposure with proper TLS certificate validation and network segmentation preventing MITM positioning.

🌐 Internet-Facing: MEDIUM - Requires attacker to be positioned between client and SMTP server, but many SMTP servers are internet-facing.
🏢 Internal Only: LOW - Requires internal network compromise or rogue internal systems to position for MITM.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires network positioning for MITM attack and active SMTP traffic to intercept. Exploitation depends on network architecture and attacker positioning.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ADM 4.3.4 and ADM 5.1.1 or later

Vendor Advisory: https://www.asustor.com/security/security_advisory_detail?id=49

Restart Required: Yes

Instructions:

1. Log into ADM web interface. 2. Go to Settings > ADM Update. 3. Check for updates. 4. Install ADM 4.3.4 or ADM 5.1.1 or later. 5. Restart system when prompted.

🔧 Temporary Workarounds

Disable SMTP notifications

all

Temporarily disable email notifications until patch can be applied

Use local SMTP relay with strict certificate validation

all

Configure SMTP to use a local relay server with proper TLS certificate validation enabled

🧯 If You Can't Patch

  • Segment network to prevent MITM positioning between ADM system and SMTP server
  • Monitor network traffic for unexpected SSL/TLS certificate changes between ADM and SMTP servers

🔍 How to Verify

Check if Vulnerable:

Check ADM version in web interface: Settings > ADM Update. If version is between 4.1.0-4.3.3.RKD2 or 5.0.0-5.1.0.RN42 and SMTP notifications are configured, system is vulnerable.

Check Version:

ssh admin@[nas-ip] 'cat /etc/nas.conf | grep version'

Verify Fix Applied:

Verify ADM version is 4.3.4 or higher (for ADM 4.x) or 5.1.1 or higher (for ADM 5.x) in Settings > ADM Update.

📡 Detection & Monitoring

Log Indicators:

  • Failed SSL/TLS handshake attempts in msmtp logs
  • Unexpected certificate warnings in system logs

Network Indicators:

  • SSL/TLS certificate changes between ADM system and SMTP server
  • Unencrypted SMTP traffic when TLS expected

SIEM Query:

source="asustor_adm" AND (event="ssl_error" OR event="certificate_validation_failed" OR process="msmtp")

🔗 References

📤 Share & Export