First published: Fri Jul 13 2018(Updated: )
Synology NAS servers DS107, firmware version 3.1-1639 and prior, and DS116, DS213, firmware versions prior to 5.2-5644-1, use non-random default credentials of: guest:(blank) and admin:(blank) . A remote network attacker can gain privileged access to a vulnerable device.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Synology Ds107 Firmware | <=3.1-1639 | |
Synology Ds107 | ||
Synology Ds213 Firmware | <=5.2-5644-1 | |
Synology Ds213 | ||
Synology Ds116 Firmware | <=5.2-5644-1 | |
Synology Ds116 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6554 poses a high security risk due to the use of non-random default credentials that can allow unauthorized access.
To resolve CVE-2016-6554, update the firmware of affected Synology NAS devices to the latest version that addresses this vulnerability.
CVE-2016-6554 affects the Synology NAS servers DS107 with firmware version 3.1-1639 and prior, and DS116, DS213 with firmware versions prior to 5.2-5644-1.
A remote attacker can gain privileged access to a vulnerable Synology NAS device through CVE-2016-6554.
The default credentials exposed in CVE-2016-6554 are guest with a blank password and admin with a blank password.