SSL Certificate Validation Vulnerability in ADM by Asustor
CVE-2026-24932

8.9HIGH

Key Information:

Vendor

Asustor

Status
Vendor
CVE Published:
3 February 2026

What is CVE-2026-24932?

The ADM software from Asustor contains a vulnerability within its DDNS update function that fails to validate the hostname of the TLS/SSL certificate correctly. This oversight allows remote attackers to potentially intercept communications and execute Man-in-the-Middle (MitM) attacks. Consequently, sensitive information associated with the DDNS update process—such as user account emails, MD5 hashed passwords, and device serial numbers—may be exposed. Users are advised to review the latest security advisories and update their systems to safeguard against potential exploitation.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

ADM Linux 4.1.0 <= 4.3.3.ROF1

ADM Linux 5.0.0 <= 5.1.1.RCI1

References

CVSS V4

Score:
8.9
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Nuke
.