Share This:

Cybersecurity Threat Advisory

Synology, network-attached storage (NAS) maker, addressed critical security vulnerability,  CVE-2024-10443, which impacts their DiskStation and BeePhotos applications. This is an unauthenticated vulnerability that can allow attackers to obtain root-level code execution on Synology NAS devices. Review the details in this Cybersecurity Threat Advisory to secure your NAS devices.

What is the threat?

CVE-2024-10443 is a zero-click vulnerability which enable attackers to gain access to devices and steal data or plant malware without user interaction. Once exploited, a malicious actor will have full access to the system and can turn the affected device into a botnet to further attack other infrastructures.

Why is it noteworthy?

As this is a zero-click vulnerability in which no user interaction is required, threat actors can easily exploit this vulnerability to gain access to the system, steal personal and corporate files, plant backdoors, or infect the system with ransomware. The SynologyPhotos app is enabled by default on BeeStation storage devices. It is also used in their DiskStation storage systems.

What is the exposure or risk?

The flaw affects the following Synology versions:

  • BeePhotos for Beestation OS 1.0 and 1.1
  • Synology Photos 1.6 and 1.7 for DSM 7.2.

Additionally, because the affected applications come pre-installed with the devices, all Synology users are at risk. NAS devices are considered high-value targets for ransomware operators since they store large amounts of data. In addition, many users connect them directly to the internet. While the systems can be set up with a gateway requiring credentials, the part of the photo app that contains the zero-click vulnerability does not require authentication.

What are the recommendations?

Barracuda recommends the following actions to secure your NAS devices against this threat:

  • Update all BeeStation or SynologyPhotos devices manually as soon as possible since Synology’s NAS devices do not update automatically.
  • Apply malware-scanning software on your devices and check regularly.

References

For more in-depth information on the recommendations, please visit the following links:

If you have any questions about this Cybersecurity Threat Advisory, please contact Barracuda XDR’s Security Operations Center.


Share This:
Zachary Beaudet

Posted by Zachary Beaudet

Zachary is a Cybersecurity Analyst at Barracuda MSP. He's a security expert, working on our Blue Team within our Security Operations Center. Zachary supports our XDR service delivery and is highly skilled at analyzing security events to detect cyber threats, helping keep our partners and their customers protected.

Leave a reply

Your email address will not be published. Required fields are marked *