![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.170499 |
Category: | Denial of Service |
Title: | Synology Router Manager (SRM) 1.2.x Multiple Vulnerabilities (Synology-SA-20:14) |
Summary: | Synology Router Manager (SRM) is prone to multiple; vulnerabilities. |
Description: | Summary: Synology Router Manager (SRM) is prone to multiple vulnerabilities. Vulnerability Insight: The following vulnerabilities exist: - CVE-2020-27649: An improper certificate validation vulnerability in OpenVPN client allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. - CVE-2020-27651: SRM does not set the Secure flag for the session cookie in an HTTPS session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an HTTP session. - CVE-2020-27653: An algorithm downgrade vulnerability in QuickConnect allows man-in-the-middle attackers to spoof servers and obtain sensitive information via unspecified vectors. - CVE-2020-27654: An improper access control vulnerability in lbd allows remote attackers to execute arbitrary commands via port (1) 7786/tcp or (2) 7787/tcp. - CVE-2020-27655: An improper access control vulnerability allows remote attackers to access restricted resources via inbound QuickConnect traffic. - CVE-2020-27657: A cleartext transmission of sensitive information vulnerability in DDNS allows man-in-the-middle attackers to eavesdrop authentication information of DNSExit via unspecified vectors. - CVE-2020-27658: SRM does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie. Affected Software/OS: SRM version 1.2.x prior to 1.2.4-8081. Solution: Update to firmware version 1.2.4-8081 or later. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2020-27649 https://www.synology.com/security/advisory/Synology_SA_20_14 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1058 Common Vulnerability Exposure (CVE) ID: CVE-2020-27651 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1059 Common Vulnerability Exposure (CVE) ID: CVE-2020-27653 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1061 Common Vulnerability Exposure (CVE) ID: CVE-2020-27654 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1064 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1065 Common Vulnerability Exposure (CVE) ID: CVE-2020-27655 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1066 Common Vulnerability Exposure (CVE) ID: CVE-2020-27657 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1071 Common Vulnerability Exposure (CVE) ID: CVE-2020-27658 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1086 |
Copyright | Copyright (C) 2023 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |