CVE-2024-10442
Published: 19 March 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2024-10442 is an off-by-one error (CWE-193) in the transmission component of Synology Replication Service versions prior to 1.0.12-0066, 1.2.2-0353, and 1.3.0-0423, as well as Synology Unified Controller (DSMUC) versions prior to 3.1.4-23079. This vulnerability enables remote attackers to execute arbitrary code via unspecified vectors, with a maximum CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), indicating critical severity due to its network accessibility, lack of prerequisites, and potential for complete system compromise.
Remote, unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation grants arbitrary code execution on the affected component, potentially escalating to broader system-wide impact, including high confidentiality, integrity, and availability disruptions across the targeted Synology systems.
Synology's security advisory (Synology_SA_24_22) details mitigation through updating to the fixed versions: Synology Replication Service 1.0.12-0066, 1.2.2-0353, or 1.3.0-0423, and DSMUC 3.1.4-23079 or later. Security practitioners should prioritize patching affected installations and monitor for unusual network activity on exposed Replication Service ports.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The CVE describes a remote, unauthenticated arbitrary code execution vulnerability in a network-accessible service (Synology Replication Service), which directly maps to exploitation of public-facing applications for initial access.