First published: Thu Mar 28 2024(Updated: )
Improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in SnapShot.CountByCategory webapi component in Synology Surveillance Station before 9.2.0-9289 and 9.2.0-11289 allows remote authenticated users to inject SQL commands via unspecified vectors.
Credit: security@synology.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Synology Surveillance Station | <9.2.0-9289 | |
Synology DiskStation Manager | =6.2 | |
All of | ||
Synology Surveillance Station | <9.2.0-11289 | |
Any of | ||
Synology DiskStation Manager | =7.1 | |
Synology DiskStation Manager | =7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29230 has a high severity rating due to its potential impact on the confidentiality and integrity of the database.
To fix CVE-2024-29230, upgrade to Synology Surveillance Station version 9.2.0-9289 or later.
CVE-2024-29230 affects users of Synology Surveillance Station versions prior to 9.2.0-9289 and 9.2.0-11289 who are remote authenticated users.
CVE-2024-29230 is an SQL Injection vulnerability that allows attackers to execute arbitrary SQL commands.
The risks of CVE-2024-29230 include unauthorized access to sensitive data and manipulation of the database.