Synology VPN Client Flaw Exposes User PINs
CVE Notify is flagging a significant security flaw, CVE-2021-47961, affecting Synology SSL VPN Client versions prior to 1.4.5-0684. The vulnerability stems from the insecure, plaintext storage of user password credentials. This could allow a remote attacker to nab a user’s PIN code.
Exploiting this weakness could pave the way for attackers to mess with VPN configurations. Worse still, if an attacker can trick a user into interacting with the compromised system, they might be able to sniff out subsequent VPN traffic. This is a serious oversight that could lead to unauthorized access and data interception, bypassing the intended security of the VPN connection.
What This Means For You
- Ensure all Synology SSL VPN Client installations are updated to version 1.4.5-0684 or later to patch CVE-2021-47961, mitigating the risk of PIN code exposure and subsequent traffic interception.
Related ATT&CK Techniques
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2021-47961 | Information Disclosure | Synology SSL VPN Client before 1.4.5-0684, plaintext storage of password, insecure storage of PIN code |
| CVE-2021-47961 | Misconfiguration | Synology SSL VPN Client before 1.4.5-0684, insecure storage of PIN code |
Get the full picture on this threat
Search by organization or CVE, get structured IOCs for your SIEM, and set watchlist alerts — delivered to your Telegram in seconds.
Try Intel Bot →