Synology DSM NFS服务严重漏洞分析(CVE-2025-1021)
Synology DSM软件发现严重安全漏洞(CVE-2025-1021),允许未授权远程攻击者通过NFS服务读取任意文件。该漏洞影响多个DSM版本,风险等级为“重要”,CVSS3基分为7.5。建议用户立即更新系统至最新版本,并检查NFS配置以防止数据泄露。 2025-4-23 14:19:47 Author: cybersecuritynews.com(查看原文) 阅读量:19 收藏

Synology Network File System Vulnerability

A severe security vulnerability in Synology’s DiskStation Manager (DSM) software has been identified. This vulnerability allows remote attackers to read arbitrary files through the Network File System (NFS) service without proper authorization. 

The vulnerability, tracked as CVE-2025-1021 and detailed in a security advisory, was resolved in recent updates and affects multiple versions of the popular network-attached storage (NAS) operating system.

Synology NFS Vulnerability – CVE-2025-1021

The security flaw, rated as “Important” with a CVSS3 Base Score of 7.5, stems from a missing authorization vulnerability in the “synocopy” component of Synology’s DSM. 

Google News

This vulnerability enables unauthenticated remote attackers to bypass security controls and access sensitive files through a writable NFS service.

According to the technical details released by Synology on February 26, 2025, and updated on April 23, 2025, the vulnerability is characterized by the CVSS3 Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N. 

This vector indicates a network-exploitable vulnerability with low attack complexity, requiring no privileges or user interaction, and potentially resulting in high confidentiality impact.

This vulnerability is particularly concerning because it allows attackers to read arbitrary files without authentication.

Organizations using Synology NAS devices should update immediately to prevent unauthorized access to sensitive data.

Credit for discovering the vulnerability goes to the DEVCORE Research Team (https://devco.re/), a group known for identifying critical security issues in enterprise software and hardware products.

Risk FactorsDetails
Affected ProductsDSM < 7.1.1-42962-8, DSM < 7.2.1-69057-7, DSM < 7.2.2-72806-3
ImpactAllows remote attackers to read arbitrary files, potentially compromising sensitive data
Exploit PrerequisitesNo authentication or user interaction required; attacker must have network access to a writable NFS service
CVSS 3.1 Score7.5 (Important)

Affected Products and Remediation

The vulnerability affects multiple versions of Synology’s DSM operating system:

  • DSM 7.2.2: Users should upgrade to version 7.2.2-72806-3 or later.
  • DSM 7.2.1: Users should upgrade to version 7.2.1-69057-7 or later.
  • DSM 7.1: Users should upgrade to version 7.1.1-42962-8 or later.

Synology has confirmed there are no mitigations available other than applying the updates, making it crucial for users to patch affected systems promptly.

Recommendations for Users

Security experts recommend that Synology users take the following steps immediately:

  • Check the DSM version running on all Synology devices.
  • Apply the appropriate update based on the current version.
  • Review NFS share configurations and permissions.
  • Monitor system logs for any suspicious activity that might indicate previous exploitation.

The vulnerability highlights the importance of updating network storage devices, especially those exposed to the internet or accessible on corporate networks. 

Users are strongly advised to prioritize these updates to protect their data from potential breaches.

Malware Trends Report Based on 15000 SOC Teams Incidents, Q1 2025 out!-> Get Your Free Copy


文章来源: https://cybersecuritynews.com/synology-network-file-system-vulnerability/
如有侵权请联系:admin#unsafe.sh