Synology Router Manager Vulnerability: Immediate Update Required
Synology, a leading provider of network-attached storage (NAS) and surveillance solutions, has issued a security advisory to address a high-severity vulnerability affecting Synology Router Manager (SRM). This vulnerability, discovered during the PWN2OWN 2023 security competition, could allow man-in-the-middle attackers to execute arbitrary code or gain unauthorized access to intranet resources.
The vulnerability resides in SRM versions before 1.3.1-9346-8 for SRM 1.3 and 1.2.5-8227-11 for SRM 1.2. By exploiting this vulnerability, attackers could:
Execute arbitrary code: This means an attacker could take complete control of the affected Synology Router, potentially compromising the integrity of the network and allowing further access to connected devices.
Access intranet resources: Attackers could intercept network traffic and potentially gain unauthorized access to sensitive data or disrupt network operations.
The following Synology Router Manager versions are affected by this vulnerability:
SRM 1.3 (prior to 1.3.1-9346-8)
SRM 1.2 (prior to 1.2.5-8227-11)
Mitigation and Remediation
Synology has promptly released firmware updates to address this critical vulnerability. Users are strongly advised to upgrade their affected Synology Router devices to the latest SRM versions immediately:
SRM 1.3: Upgrade to 1.3.1-9346-8 or above.
SRM 1.2: Upgrade to 1.2.5-8227-11 or above.
Protecting Your Synology Router
In addition to upgrading the SRM firmware, we recommend the following security measures to further protect your network:
Change the default administrator password to a strong, unique password.
Disable unnecessary services and ports on the router.
Regularly check for and apply firmware updates.
Implement a layered security approach, including network segmentation and access controls.