Advisory Details

June 21st, 2024

(Pwn2Own) Synology RT6600ax Improper Access Control Firewall Bypass Vulnerability

ZDI-24-832
ZDI-CAN-22430

CVE ID
CVSS SCORE 6.6, AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Synology
AFFECTED PRODUCTS RT6600ax
VULNERABILITY DETAILS

This vulnerability allows remote attackers to bypass firewall rules and access the LAN interface on affected installations of Synology RT6600ax routers. Authentication is required to exploit this vulnerability.

The specific flaw exists within the handling of firewall rules. The issue results from improper access control after the initial setup. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root.

ADDITIONAL DETAILS Synology has issued an update to correct this vulnerability. More details can be found at:
https://www.synology.com/en-id/security/advisory/Synology_SA_23_16
DISCLOSURE TIMELINE
  • 2023-11-15 - Vulnerability reported to vendor
  • 2024-06-21 - Coordinated public release of advisory
  • 2024-07-01 - Advisory Updated
CREDIT Tri and Bien Pham (@bienpnn) from Team Orca of Sea Security
BACK TO ADVISORIES