"Critical Vulnerabilities Patched in Synology Routers"

Taiwan-based networking and storage solutions provider Synology has recently informed customers about the availability of patches for several critical vulnerabilities, including flaws likely exploited recently at the Pwn2Own hacking contest.  The company published two new critical advisories in late December.  One of the advisories describes an internally discovered vulnerability affecting Synology VPN Plus Server, which turns routers into an advanced VPN server.  The company noted that the security hole, tracked as CVE-2022-43931, is an out-of-bounds write issue in the remote desktop functionality of VPN Plus Server.  It can allow a remote attacker to execute arbitrary commands.  The second advisory describes multiple vulnerabilities impacting the Synology Router Manager (SRM), the operating system that powers the firm’s routers.  The company noted that the flaws can be exploited for arbitrary command execution, denial-of-service (DoS) attacks, and reading arbitrary files.  The SRM advisory credits several people and companies for reporting the vulnerabilities.  The issues were disclosed through Trend Micro’s Zero Day Initiative (ZDI).  This suggests that the vulnerabilities were demonstrated at the Pwn2Own Toronto 2022 hacking contest, which took place December 6-9.  

 

SecurityWeek reports: "Critical Vulnerabilities Patched in Synology Routers"

Submitted by Anonymous on