Cyber Posture

CVE-2024-50631

High

Published: 19 March 2025

Published
19 March 2025
Modified
16 January 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score 0.0106 77.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2024-50631 is an SQL injection vulnerability (CWE-89) in the system syncing daemon of Synology Drive Server. It affects versions prior to 3.0.4-12699, 3.2.1-23280, 3.5.0-26085, and 3.5.1-26102. The flaw stems from improper neutralization of special elements used in an SQL command, enabling remote attackers to inject SQL commands limited to write operations via unspecified vectors. The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).

Remote attackers without privileges can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation allows injection of SQL commands that perform write operations, resulting in high integrity impact but no confidentiality or availability disruption.

The Synology security advisory (Synology_SA_24_21) provides details on mitigation, which involves updating to Synology Drive Server versions 3.0.4-12699, 3.2.1-23280, 3.5.0-26085, or 3.5.1-26102, depending on the branch. Security practitioners should review the full advisory at https://www.synology.com/en-global/security/advisory/Synology_SA_24_21 for patch deployment guidance.

Details

CWE(s)
CWE-89

Affected Products

synology
drive server
≤ 3.0.4-12699 · ≤ 3.2.1-23280 · ≤ 3.5.0-26085

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Unauthenticated remote SQL injection in public-facing Synology Drive Server syncing daemon directly enables T1190: Exploit Public-Facing Application for initial access; write-only limitation prevents mapping to collection or command execution techniques.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References