First published: Fri Feb 26 2021(Updated: )
Cleartext transmission of sensitive information vulnerability in synorelayd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to spoof servers via an HTTP session.
Credit: security@synology.com
Affected Software | Affected Version | How to fix |
---|---|---|
Synology DiskStation Manager | <6.2.3-25426-3 | |
Synology Vs960hd Firmware | ||
Synology Vs960hd | ||
Synology Skynas Firmware | ||
Synology Skynas | ||
Synology Diskstation Manager Unified Controller | =3.0 | |
Synology Uc3200 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26564 is a vulnerability that allows man-in-the-middle attackers to spoof servers via an HTTP session.
CVE-2021-26564 has a severity score of 8.7, which is classified as high severity.
Synology DiskStation Manager (DSM) before 6.2.3-25426-3 and Synology Vs960hd Firmware are affected by CVE-2021-26564.
To prevent man-in-the-middle attacks, ensure that you are using secure protocols such as HTTPS, regularly update your software and devices, and use strong and unique passwords.
You can find more information about CVE-2021-26564 at the official Synology security advisory (https://www.synology.com/security/advisory/Synology_SA_20_26) and the Talos Intelligence vulnerability report (https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1160).