First published: Thu Mar 28 2024(Updated: )
Improper validation of array index vulnerability in UserPrivilege.Enum webapi component in Synology Surveillance Station before 9.2.0-9289 and 9.2.0-11289 allows remote authenticated users to bypass security constraints via unspecified vectors.
Credit: security@synology.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Synology Surveillance Station | <9.2.0-9289 | |
Synology DiskStation Manager | =6.2 | |
All of | ||
Synology Surveillance Station | <9.2.0-11289 | |
Any of | ||
Synology DiskStation Manager | =7.1 | |
Synology DiskStation Manager | =7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29231 has a medium severity rating as it allows remote authenticated users to bypass security constraints.
To fix CVE-2024-29231, users should upgrade to Synology Surveillance Station version 9.2.0-9289 or newer.
CVE-2024-29231 affects Synology Surveillance Station versions prior to 9.2.0-9289 and 9.2.0-11289.
No, CVE-2024-29231 can only be exploited by remote authenticated users.
The impact of CVE-2024-29231 is that it allows authenticated users to bypass security constraints which could lead to unauthorized access.