Synology Vulnerability Allows Remote Code Execution

Synology breach

March 23, 2025 A major security flaw in Synology’s DiskStation Manager (DSM) software could allow remote attackers to take full control of affected systems—no user interaction required.

Synology, a leading provider of network-attached storage (NAS) systems used by businesses and individuals for secure file storage and backup, confirmed the vulnerability after it was publicly demonstrated at the Pwn2Own hacking contest earlier this year. The flaw, identified as CVE-2024-10441, has been given a near-maximum severity score of 9.8 out of 10 by the Common Vulnerability Scoring System (CVSS), indicating it could have devastating effects if left unpatched.

The vulnerability lies in the system plugin daemon, which fails to properly handle output encoding. This allows attackers to run arbitrary commands on vulnerable systems from anywhere on the internet. Synology has also disclosed two additional vulnerabilities: one that could allow attackers to read limited files (CVE-2024-50629) and another that could let nearby attackers write files due to poor certificate validation (CVE-2024-10445).

Security researchers from DEVCORE, Team Smoking Barrels, and independent expert Ryan Emmons were among those who discovered the flaws.

Synology has released security updates to fix the issues in all affected versions of DSM, including versions 6.2 through 7.2.2. Users are urged to upgrade immediately, as there are no temporary workarounds available. Synology’s full security advisory is available on their website: [Synology SA-25:01](https://www.synology.com/en-us/security/advisory/Synology_SA_25_01).

With Synology NAS devices widely used in corporate environments and small offices for sensitive data storage, the risk of compromise is high if patches are not applied quickly.

 

Top Stories

Related Articles

December 23, 2025 South Korea will require facial recognition scans to open new mobile phone accounts. The new rule is more...

December 22, 2025 Apple is requiring iPhone users who have not upgraded to iOS 26 to update now after confirming more...

December 12, 2025 The United States has extradited a Ukrainian national accused of working with Russian-backed hacktivist groups that targeted more...

November 24, 2025 Google is rolling out its Gemini artificial intelligence assistant to vehicles equipped with Android Auto, promising a more...

Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com
Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn