First published: Thu Mar 28 2024(Updated: )
Improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in Log.CountByCategory webapi component in Synology Surveillance Station before 9.2.0-9289 and 9.2.0-11289 allows remote authenticated users to inject SQL commands via unspecified vectors.
Credit: security@synology.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Synology Surveillance Station | <9.2.0-9289 | |
Synology DiskStation Manager | =6.2 | |
All of | ||
Synology Surveillance Station | <9.2.0-11289 | |
Any of | ||
Synology DiskStation Manager | =7.1 | |
Synology DiskStation Manager | =7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29238 is considered a critical vulnerability due to the potential for SQL Injection attacks that could compromise database integrity.
CVE-2024-29238 allows remote authenticated users to inject arbitrary SQL commands, potentially leading to unauthorized data access or manipulation.
To fix CVE-2024-29238, update your Synology Surveillance Station to version 9.2.0-9289 or later.
CVE-2024-29238 affects Synology Surveillance Station versions prior to 9.2.0-9289 and 9.2.0-11289.
No, Synology DiskStation Manager versions 6.2, 7.1, and 7.2 do not have the vulnerability associated with CVE-2024-29238.