Synology VPN Client Flaw Exposes User PINs

Synology VPN Client Flaw Exposes User PINs

CVE Notify is flagging a significant security flaw, CVE-2021-47961, affecting Synology SSL VPN Client versions prior to 1.4.5-0684. The vulnerability stems from the insecure, plaintext storage of user password credentials. This could allow a remote attacker to nab a user’s PIN code.

Exploiting this weakness could pave the way for attackers to mess with VPN configurations. Worse still, if an attacker can trick a user into interacting with the compromised system, they might be able to sniff out subsequent VPN traffic. This is a serious oversight that could lead to unauthorized access and data interception, bypassing the intended security of the VPN connection.

What This Means For You

  • Ensure all Synology SSL VPN Client installations are updated to version 1.4.5-0684 or later to patch CVE-2021-47961, mitigating the risk of PIN code exposure and subsequent traffic interception.

Related ATT&CK Techniques

Indicators of Compromise

IDTypeIndicator
CVE-2021-47961 Information Disclosure Synology SSL VPN Client before 1.4.5-0684, plaintext storage of password, insecure storage of PIN code
CVE-2021-47961 Misconfiguration Synology SSL VPN Client before 1.4.5-0684, insecure storage of PIN code
Get the full picture on this threat Search by organization or CVE, get structured IOCs for your SIEM, and set watchlist alerts — delivered to your Telegram in seconds.
Try Intel Bot →