BOOK THIS SPACE FOR AD
ARTICLE ADSynology warns customers that some of its NAS devices are affected by multiple critical Netatalk vulnerabilities.
Synology has warned customers that multiple critical Netatalk vulnerabilities affect some of its network-attached storage (NAS) devices. Netatalk is a free, open-source implementation of the Apple Filing Protocol that allows Unix-like operating systems to serve as a file server for macOS computers. QNAP NAS devices support the AFP protocol to enable macOS users to access data on the NAS.
“Multiple vulnerabilities allow remote attackers to obtain sensitive information and possibly execute arbitrary code via a susceptible version of Synology DiskStation Manager (DSM) and Synology Router Manager (SRM).” reads the advisory published by the vendor.
The Netatalk maintainers released version 3.1.13 to fix these flaws on March 22. Synology products affected by the flaw are:
DSM 7.1 | Critical | Upgrade to 7.1-42661-1 or above. |
DSM 7.0 | Critical | Ongoing |
DSM 6.2 | Critical | Ongoing |
VS Firmware 2.3 | Critical | Ongoing |
SRM 1.2 | Critical | Ongoing |
Synology also warns customers of other three flaws, tracked as CVE-2022-23125, CVE-2022-23122, CVE-2022-0194 that could allow remote attackers to run arbitrary code on affected devices.
Taiwanese vendor QNAP also urges customers to disable the AFP file service protocol on their NAS devices until it fixes critical Netatalk flaws.
The company has announced it has already addressed the vulnerabilities in QTS 4.5.4.2012 build 20220419 and later.
Please vote for Security Affairs as the best European Cybersecurity Blogger Awards 2022 – VOTE FOR YOUR WINNERS
Vote for me in the sections “The Underdogs – Best Personal (non-commercial) Security Blog” and “The Tech Whizz – Best Technical Blog” and others of your choice.
To nominate, please visit: https://docs.google.com/forms/d/e/1FAIpQLSfxxrxICiMZ9QM9iiPuMQIC-IoM-NpQMOsFZnJXrBQRYJGCOw/viewform
Follow me on Twitter: @securityaffairs and Facebook
(SecurityAffairs – hacking, Synology)