Synology Router Manager (SRM) Vulnerability Allows Arbitrary Code Execution
CVE-2024-39348
7.5HIGH
Summary
A vulnerability has been identified within the AirPrint functionality of Synology Router Manager (SRM) that allows for code to be downloaded without proper integrity checks. This flaw exposes systems running versions before 1.2.5-8227-11 and 1.3.1-9346-8 to potential man-in-the-middle attacks, where an attacker could execute arbitrary code by exploiting unspecified vectors. Organizations utilizing affected versions are urged to apply updates and implement security best practices to safeguard their networks.
Affected Version(s)
Synology Router Manager (SRM) 1.3
Synology Router Manager (SRM) 1.3 < 1.3.1-9346-8
Synology Router Manager (SRM) 1.2 < 1.2.5-8227-11
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database
Credit
Tomer Goldschmidt and Sharon Brizinov of Claroty Research - Team82