CVE-2025-13053

3.7 LOW

📋 TL;DR

This vulnerability allows man-in-the-middle attackers to intercept and potentially modify communications between ASUSTOR NAS devices and UPS servers due to improper TLS certificate validation. Attackers could obtain sensitive UPS configuration information. Affected systems are ASUSTOR NAS devices running ADM versions 4.1.0 through 4.3.3.RKD2 and 5.0.0 through 5.1.0.RN42.

💻 Affected Systems

Products:
  • ASUSTOR NAS devices
Versions: ADM 4.1.0 through 4.3.3.RKD2, 5.0.0 through 5.1.0.RN42
Operating Systems: ASUSTOR ADM (Linux-based)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems configured to retrieve UPS status or control UPS via network.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers intercept UPS configuration data including credentials, network settings, and control parameters, potentially allowing them to manipulate UPS behavior or gain further network access.

🟠

Likely Case

Attackers on the same network segment intercept UPS status and configuration data, compromising UPS management security.

🟢

If Mitigated

With proper network segmentation and certificate validation, impact is limited to denial of UPS status monitoring.

🌐 Internet-Facing: MEDIUM - If NAS UPS management is exposed to internet, attackers could intercept communications, though this requires specific configuration.
🏢 Internal Only: MEDIUM - Attackers on internal network can exploit if they can intercept traffic between NAS and UPS server.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires network position to intercept traffic between NAS and UPS server. No authentication bypass needed for interception.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ADM 4.3.4.RKJ1 and later, ADM 5.1.1.RN43 and later

Vendor Advisory: https://www.asustor.com/security/security_advisory_detail?id=49

Restart Required: Yes

Instructions:

1. Log into ADM web interface. 2. Go to Settings > ADM Update. 3. Check for updates. 4. Install latest ADM version. 5. Restart NAS when prompted.

🔧 Temporary Workarounds

Disable network UPS monitoring

all

Temporarily disable UPS status retrieval over network until patched

Navigate to ADM Settings > Hardware > UPS > Disable 'Enable UPS support' or configure for USB/local connection only

Network segmentation

all

Isolate NAS and UPS server on separate VLAN to limit attack surface

🧯 If You Can't Patch

  • Segment NAS and UPS server on isolated network segment
  • Use direct USB connection between NAS and UPS instead of network monitoring

🔍 How to Verify

Check if Vulnerable:

Check ADM version in Settings > ADM Update. If version is between affected ranges and UPS network monitoring is enabled, system is vulnerable.

Check Version:

ssh admin@nas-ip 'cat /etc/nas.conf | grep version' or check via ADM web interface

Verify Fix Applied:

Verify ADM version is 4.3.4.RKJ1 or later for ADM 4.x, or 5.1.1.RN43 or later for ADM 5.x.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected certificate validation failures in system logs
  • Unusual network connections to UPS port (default 3493)

Network Indicators:

  • MITM activity between NAS and UPS server IPs
  • Unencrypted or improperly validated TLS traffic on UPS port

SIEM Query:

source="nas-logs" AND ("certificate" OR "TLS" OR "UPS") AND ("fail" OR "error" OR "invalid")

🔗 References

📤 Share & Export