Wednesday, May 7, 2025
HomeCVE/vulnerabilitySynology Network File System Vulnerability Allows Unauthorized File Access

Synology Network File System Vulnerability Allows Unauthorized File Access

Published on

SIEM as a Service

Follow Us on Google News

A critical security vulnerability in Synology’s Network File System (NFS) service, tracked as CVE-2025-1021, has been resolved after allowing unauthorized remote attackers to access sensitive files on vulnerable DiskStation Manager (DSM) devices.

The flaw, marked as “Important” in severity by Synology, affects several versions of DSM, the operating system powering the company’s popular Network Attached Storage (NAS) solutions.

Vulnerability Details

The issue centers around a missing authorization check in the synocopy component of DSM.

- Advertisement - Google News

According to Synology’s security advisory Synology-SA-25:03, the vulnerability permits unauthenticated attackers to read arbitrary files via a writable NFS service, potentially exposing confidential information.

The Common Vulnerability Scoring System (CVSS v3.1) rates this risk at 7.5 out of 10, underlining its seriousness.

Crucially, the attack does not require any user interaction or authentication, enabling exploitation by remote threat actors.

Successful attacks could lead to severe data leakage, including personal files, business documents, and other sensitive data stored on NAS devices.

AspectDetails
Vulnerability IDCVE-2025-1021
ProductSynology DiskStation Manager (DSM)
Componentsynocopy (NFS Service)
SeverityImportant
CVSS v3.1 Score7.5

Affected Products and Fixes

The vulnerability is present in the following DSM versions:

  • DSM 7.2.2 — Fixed in 7.2.2-72806-3 and later
  • DSM 7.2.1 — Fixed in 7.2.1-69057-7 and later
  • DSM 7.1 — Fixed in 7.1.1-42962-8 and later

Synology recommends that all users immediately upgrade to the latest patched versions. No mitigation strategy is available other than applying the update.

This issue was responsibly disclosed by the DEVCORE Research Team (https://devco.re/), who identified the flaw and reported it to Synology.

The advisory was first released on February 26, 2025, with full vulnerability details disclosed on April 23, 2025, after patches were made available.

Owners of Synology NAS devices running affected versions of DSM are strongly urged to upgrade as soon as possible to avoid unauthorized access to their stored files.

Organizations using exposed NFS services should be particularly vigilant, as exploitation does not require any special access credentials.

This vulnerability highlights the importance of regular updates and monitoring of NAS environments, especially those accessible over network file systems.

Synology’s swift response and the coordinated disclosure with security researchers have helped to minimize the potential impact, but the incident serves as a reminder that NAS security is critical in protecting sensitive data in homes and businesses alike.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Top Ransomware Groups Target Financial Sector, 406 Incidents Revealed

Flashpoint analysts have reported that between April 2024 and April 2025, the financial sector...

Agenda Ransomware Group Enhances Tactics with SmokeLoader and NETXLOADER

The Agenda ransomware group, also known as Qilin, has been reported to intensify its...

SpyCloud Analysis Reveals 94% of Fortune 50 Companies Have Employee Data Exposed in Phishing Attacks

SpyCloud, the leading identity threat protection company, today released an analysis of nearly 6...

PoC Tool Released to Detect Servers Affected by Critical Apache Parquet Vulnerability

F5 Labs has released a new proof-of-concept (PoC) tool designed to help organizations detect...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Top Ransomware Groups Target Financial Sector, 406 Incidents Revealed

Flashpoint analysts have reported that between April 2024 and April 2025, the financial sector...

Agenda Ransomware Group Enhances Tactics with SmokeLoader and NETXLOADER

The Agenda ransomware group, also known as Qilin, has been reported to intensify its...

PoC Tool Released to Detect Servers Affected by Critical Apache Parquet Vulnerability

F5 Labs has released a new proof-of-concept (PoC) tool designed to help organizations detect...