Remote Authenticated Users Can Bypass Security Constraints via Unspecified Vectors
CVE-2024-29231

8.8HIGH

Key Information:

Vendor
Synology
Vendor
CVE Published:
28 March 2024

Summary

The UserPrivilege.Enum web API component in Synology Surveillance Station contains an improper validation of an array index vulnerability. This flaw allows remote authenticated users to bypass essential security constraints, potentially exposing sensitive data or control over the system. The issue affects versions of Surveillance Station prior to 9.2.0-9289 and 9.2.0-11289, highlighting the importance of applying security updates to maintain system integrity. Security stakeholders should prioritize remediating this vulnerability to safeguard their installations.

Affected Version(s)

Surveillance Station *

Surveillance Station * < 9.2.0-9289

Surveillance Station * < 9.2.0-11289

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

TEAM.ENVY (https://team-envy.gitbook.io/team.envy/about-us)
.