CVE-2026-24934
📋 TL;DR
This CVE describes an insecure DDNS implementation in ASUSTOR ADM software where HTTP connections lack SSL/TLS certificate validation. Unauthenticated attackers can perform MitM attacks to spoof WAN IP responses, causing devices to update DDNS records with incorrect IP addresses. Affected systems include ASUSTOR NAS devices running ADM versions 4.1.0 through 4.3.3.ROF1 and 5.0.0 through 5.1.1.RCI1.
💻 Affected Systems
- ASUSTOR NAS devices
⚠️ Risk & Real-World Impact
Worst Case
Attackers redirect all traffic intended for the device to malicious servers, enabling credential theft, data interception, or ransomware deployment.
Likely Case
Temporary service disruption as legitimate users cannot reach the device via its DDNS hostname.
If Mitigated
Limited impact if DDNS is disabled or devices are behind properly configured firewalls with restricted external access.
🎯 Exploit Status
Exploitation requires MitM position between device and DDNS IP lookup server.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: ADM 4.3.3.ROF2 and ADM 5.1.1.RCI2
Vendor Advisory: https://www.asustor.com/security/security_advisory_detail?id=50
Restart Required: Yes
Instructions:
1. Log into ADM web interface. 2. Go to Settings > ADM Update. 3. Check for updates. 4. Install ADM 4.3.3.ROF2 or ADM 5.1.1.RCI2. 5. Reboot the NAS when prompted.
🔧 Temporary Workarounds
Disable DDNS
allTemporarily disable Dynamic DNS functionality to eliminate the attack vector.
Navigate to Settings > DDNS in ADM web interface and disable all DDNS services
Use Static IP
allConfigure device with static WAN IP instead of relying on DDNS.
Configure network settings with static IP from your ISP or network administrator
🧯 If You Can't Patch
- Disable DDNS functionality completely
- Restrict device to internal network only and disable external access
🔍 How to Verify
Check if Vulnerable:
Check ADM version in Settings > ADM Update. If version is between 4.1.0-4.3.3.ROF1 or 5.0.0-5.1.1.RCI1, and DDNS is enabled, system is vulnerable.
Check Version:
ssh admin@nas-ip 'cat /etc/nas.conf | grep version'
Verify Fix Applied:
Confirm ADM version is 4.3.3.ROF2 or 5.1.1.RCI2 or later in Settings > ADM Update.
📡 Detection & Monitoring
Log Indicators:
- Unexpected DDNS update failures
- DDNS updates with unusual IP addresses
- SSL/TLS certificate validation errors in system logs
Network Indicators:
- Unencrypted HTTP traffic to DDNS IP lookup services
- DNS queries returning unexpected IP addresses for DDNS hostnames
SIEM Query:
source="asustor_nas" (event="ddns_update" AND (ip="0.0.0.0" OR ip="127.0.0.1" OR ip="192.168.*" OR ip="10.*" OR ip="172.16.*"))