Cyber Posture

CVE-2024-10442

Critical

Published: 19 March 2025

Published
19 March 2025
Modified
16 January 2026
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.1459 94.5th percentile
Risk Priority 29 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2024-10442 is an off-by-one error (CWE-193) in the transmission component of Synology Replication Service versions prior to 1.0.12-0066, 1.2.2-0353, and 1.3.0-0423, as well as Synology Unified Controller (DSMUC) versions prior to 3.1.4-23079. This vulnerability enables remote attackers to execute arbitrary code via unspecified vectors, with a maximum CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), indicating critical severity due to its network accessibility, lack of prerequisites, and potential for complete system compromise.

Remote, unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation grants arbitrary code execution on the affected component, potentially escalating to broader system-wide impact, including high confidentiality, integrity, and availability disruptions across the targeted Synology systems.

Synology's security advisory (Synology_SA_24_22) details mitigation through updating to the fixed versions: Synology Replication Service 1.0.12-0066, 1.2.2-0353, or 1.3.0-0423, and DSMUC 3.1.4-23079 or later. Security practitioners should prioritize patching affected installations and monitor for unusual network activity on exposed Replication Service ports.

Details

CWE(s)
CWE-193

Affected Products

synology
unified controller
≤ 3.1.4-23079
synology
replication service
≤ 1.0.12-0066 · ≤ 1.2.2-0353
syncology
replication service
≤ 1.3.0-0423

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The CVE describes a remote, unauthenticated arbitrary code execution vulnerability in a network-accessible service (Synology Replication Service), which directly maps to exploitation of public-facing applications for initial access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References