Synology DSM 6.2.4,7.0.1,7.1: Uncontrolled path element CVE-2023-0142
CVE-2023-0142 Published on June 13, 2023
Uncontrolled search path element vulnerability in Backup Management functionality in Synology DiskStation Manager (DSM) before 6.2.4-25556-8, 7.0.1-42218-7 and 7.1-42661 allows remote authenticated users with administrator privileges to read or write arbitrary files via unspecified vectors.
Vulnerability Analysis
CVE-2023-0142 is exploitable with network access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality and integrity, and no impact on availability.
Weakness Type
What is a DLL preloading Vulnerability?
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
CVE-2023-0142 has been classified to as a DLL preloading vulnerability or weakness.
Products Associated with CVE-2023-0142
Want to know whenever a new CVE is published for Synology products? stack.watch will email you.
Affected Versions
Synology DiskStation Manager (DSM):- Version 7.2 and below 7.2.* is unaffected.
- Version 7.1 and below 7.1-42661 is affected.
- Version 7.0 and below 7.0.1-42218-7 is affected.
- Version 6.2 and below 6.2.4-25556-8 is affected.
- Before 6.2 is unknown.
- Version 3.1 and below 3.1.* is affected.
- Before 3.1 is unknown.
- Version 1.3 and below 1.3.* is affected.
- Version 1.2 and below 1.2.* is affected.
- Before 1.2 is unknown.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.