As Synology explains in security advisories published two days after the flaws were demoed at Pwn2Own Ireland 2024 to hijack a Synology BeeStation BST150-4T device, the security flaws enable remote attackers to gain remote code execution as root on vulnerable NAS appliances exposed online.

“The vulnerability was initially discovered, within just a few hours, as a replacement for another Pwn2Own submission. The issue was disclosed to Synology immediately after demonstration, and within 48 hours a patch was made available which resolves the vulnerability,” Midnight Blue said.

From a different source:

Synology proactively sponsors and works with security researchers as part of product security initiatives. At this year’s Pwn2Own Ireland 2024 event, which took place in late October, we successfully discovered and resolved multiple security vulnerabilities.

While these vulnerabilities are not being exploited, we recommend all Synology device administrators immediately take action to secure their systems by updating due to the scope and severity of specific issues.

  • Otter@lemmy.caOP
    link
    fedilink
    English
    arrow-up
    12
    ·
    5 days ago

    If you are using any Synology products with your setup, you should go ahead and apply the recommended updates

    • kn33@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      5 days ago

      Ugh but it’s acting as the SAN so I have to shut down like all my servers to run updates on it. What a PITA.

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        1
        ·
        5 days ago

        You could move to a high availability model but that is a pain and has lots of tradeoffs.

        The device will go offline at some point. It is good to have some sort of plan of how to efficiently power it down without causing major problems. Maybe some automation to push stuff to a second NAS or something.