First published: Thu Mar 28 2024(Updated: )
Improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in AudioPattern.Delete webapi component in Synology Surveillance Station before 9.2.0-9289 and 9.2.0-11289 allows remote authenticated users to inject SQL commands via unspecified vectors.
Credit: security@synology.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Synology Surveillance Station | <9.2.0-9289 | |
Synology DiskStation Manager | =6.2 | |
All of | ||
Synology Surveillance Station | <9.2.0-11289 | |
Any of | ||
Synology DiskStation Manager | =7.1 | |
Synology DiskStation Manager | =7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29236 has a high severity rating due to the potential for SQL injection attacks.
To remediate CVE-2024-29236, update Synology Surveillance Station to version 9.2.0-9289 or later.
CVE-2024-29236 affects Synology Surveillance Station versions earlier than 9.2.0-9289 and 9.2.0-11289.
CVE-2024-29236 can be exploited by remote authenticated users with access to the AudioPattern.Delete webapi component.
CVE-2024-29236 is classified as an SQL injection vulnerability, allowing attackers to inject malicious SQL commands.