Improper Output Encoding Vulnerability in Synology BeeStation Manager and DiskStation Manager
CVE-2024-50629

5.3MEDIUM

Key Information:

Vendor

Synology

Vendor
CVE Published:
19 March 2025

Badges

🔥 Trending now📈 Trended📈 Score: 1,460👾 Exploit Exists🟡 Public PoC

What is CVE-2024-50629?

CVE-2024-50629 is a vulnerability found in Synology's BeeStation Manager (BSM) and DiskStation Manager (DSM), which are widely used operating systems for network-attached storage devices. These systems are designed to provide data storage, management, and sharing functionalities for both home and enterprise environments. The vulnerability arises from improper output encoding within the web API component, allowing remote attackers to read limited files through unspecified methods. This could significantly undermine an organization’s data integrity, potentially exposing sensitive files and leading to unauthorized access to confidential information. Such a vulnerability can be particularly damaging in environments that rely on the secure handling of user data, as it increases the risk of data breaches.

Potential impact of CVE-2024-50629

  1. Data Exposure: The improper encoding or escaping of output can enable attackers to access and read sensitive files stored on the affected devices. This could lead to unauthorized disclosure of private information, which might be leveraged for malicious purposes.

  2. Compliance Risks: Organizations managing sensitive data may face regulatory scrutiny or penalties due to the vulnerability's potential to compromise data protection measures. This exposure may violate compliance frameworks such as GDPR or HIPAA, resulting in legal ramifications.

  3. Increased Attack Surface: The ability for remote attackers to exploit this vulnerability increases the risk of further attacks. Once access to files is obtained, attackers may use this foothold to launch additional attacks on the network, possibly leading to more severe incidents such as ransomware deployment or system-wide compromise.

Affected Version(s)

BeeStation OS (BSM) 1.1

BeeStation OS (BSM) 1.1 < 1.1-65374

BeeStation OS (BSM) 1.0 < 1.1-65374

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 📈

    Vulnerability started trending

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Pumpkin Chang (@u1f383) and Orange Tsai (@orange_8361) from DEVCORE Research Team
.
CVE-2024-50629 : Improper Output Encoding Vulnerability in Synology BeeStation Manager and DiskStation Manager