Synology Network File System Vulnerability Let Read Any File

The vulnerability, tracked as CVE-2025-1021 and detailed in a security advisory, was resolved in recent updates and affects multiple versions of the popular network-attached storage (NAS) operating system. This vulnerability enables unauthenticated remote attackers to bypass security controls and access sensitive files through a writable NFS service. This vulnerability allows remote attackers to read arbitrary files through the Network File System (NFS) service without proper authorization. Credit for discovering the vulnerability goes to the DEVCORE Research Team ( ), a group known for identifying critical security issues in enterprise software and hardware products. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. A severe security vulnerability in Synology’s DiskStation Manager (DSM) software has been identified. This vector indicates a network-exploitable vulnerability with low attack complexity, requiring no privileges or user interaction, and potentially resulting in high confidentiality impact. This vulnerability is particularly concerning because it allows attackers to read arbitrary files without authentication. The vulnerability highlights the importance of updating network storage devices, especially those exposed to the internet or accessible on corporate networks. Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. Significant vulnerabilities in popular browser-based cryptocurrency wallets enable attackers to steal funds without any user interaction or approval.

This Cyber News was published on cybersecuritynews.com. Publication date: Wed, 23 Apr 2025 14:20:09 +0000


Cyber News related to Synology Network File System Vulnerability Let Read Any File

Network Protection: How to Secure a Network - Network security protects and monitors the links and the communications within the network using a combination of hardware, software, and enforced policies. Best practices for network security directly counter the major threats to the network with ...
11 months ago Esecurityplanet.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
Why Use a VLAN? Unveiling the Benefits of Virtual LANs in Network Security - Virtual Local Area Networks, or VLANs, serve as a critical computing technology designed for effective network traffic management. How VLANs function within a network environment revolves around effectively managing and directing network traffic. ...
1 year ago Securityboulevard.com
Synology Mail Server Let Remote Attackers Tamper System Configurations - Last year, Taiwanese security firm QI-ANXIN Group’s Codesafe Team identified multiple vulnerabilities in Synology products, demonstrating the ongoing attention these systems receive from security researchers. The security flaw, tracked as ...
1 month ago Cybersecuritynews.com CVE-2025-2848
Critical Synology Vulnerability Let Attackers Remote Execute Arbitrary Code - CVE-2024-10445: An improper certificate validation vulnerability in the update functionality with a CVSS score of 4.3 that enables adjacent attackers to write limited files. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber ...
1 month ago Cybersecuritynews.com CVE-2024-10445
Top 19 Network Security Threats + Defenses for Each - Network security threats are technological risks that weaken the defenses of an enterprise network, endangering proprietary data, critical applications, and the entire IT infrastructure. There are seven major categories of network security issues ...
1 year ago Esecurityplanet.com
School Wi-Fi Security Guidelines - When choosing a strong Wi-Fi password for your school network, it is crucial to follow proper guidelines to ensure maximum security. School network security heavily relies on robust Wi-Fi encryption and effective wireless network protection measures. ...
1 year ago Securityzap.com
Jumpstart your studies for ENNA with Network Assurance Prep - It's no secret that today's networks span across a vast, decentralized web of services, where anything can-and will-happen to your data. When your network's not under your direct control, it's hard to see issues. Not knowing what's going on in and ...
11 months ago Feedpress.me
Correct bad network behavior to bolster application experience - Legacy hardware-based applications existed happily in isolation, untethered from a network. Today, even the software running from personal hard drives relies on other applications across the network to perform. Many modern apps run off a remote ...
1 year ago Helpnetsecurity.com
10 Best Network as a Service for MSSP Providers - Network as a Service for Managed Security Service Providers offers a revolutionary way to provide networking and security services to clients. Network security leaders such as Perimeter81 offer Managed Service Provider partners a powerful, scalable, ...
1 year ago Cybersecuritynews.com
Synology Network File System Vulnerability Let Read Any File - The vulnerability, tracked as CVE-2025-1021 and detailed in a security advisory, was resolved in recent updates and affects multiple versions of the popular network-attached storage (NAS) operating system. This vulnerability enables unauthenticated ...
2 weeks ago Cybersecuritynews.com CVE-2025-1021
A Symphony of Network Success: Simplify, Secure, and Scale with Cisco SD-WAN Enhancements - Your network is like an orchestra, where each element assumes the role of a unique instrument-computers, devices, applications, security measures, remote connections. Cisco SD-WAN empowers both enterprise IT teams and managed service providers to ...
1 year ago Feedpress.me
Wireless Network Security: Safeguarding Your Digital Haven - As the ubiquity of wireless networks grows, so does the need for proper security measures to protect home networks from malicious attacks. Ensuring secure connections and maintaining a safe online environment requires a comprehensive understanding of ...
1 year ago Securityzap.com
What Is Dynamic Host Configuration Protocol (DHCP)? - DHCP, or Dynamic Host Configuration Protocol, is a network protocol that allows devices on a network to be automatically assigned an IP address. DHCP is used extensively in both home and enterprise networks, as it simplifies the process of ...
2 years ago Heimdalsecurity.com
11 Best SysAdmin Tools - 2025 - The tool supports various data sources, including network traces and log files, offering a versatile platform for comprehensive analysis and in-depth investigations of system and network performance. The tool features a user-friendly graphical ...
1 month ago Cybersecuritynews.com
Arcitecta enhances Mediaflux Livewire to optimize data movement - Arcitecta announced significant enhancements to its Mediaflux Livewire offering that address the challenges of transmitting data over low-bandwidth and unreliable network connections. With the latest Mediaflux Livewire, customers can securely and ...
1 year ago Helpnetsecurity.com
CMDB: Device Visibility for Bank Security - Let us see how a device visibility and control software functions to automatically alert when a rogue or unauthorized device enters your network. Device visibility and control is a cybersecurity concept that refers to the ability to discover, ...
1 year ago Feeds.dzone.com
The Future of Modern Networks Is Automated Threat Intelligence. - Every new device added to the network, be it an employee home laptop, an IoT sensor, a machine vision camera, or a cloud-based server, brings a new security threat to the company. All of these changes are making network security a critical defense ...
1 year ago Cyberdefensemagazine.com
Best practices for secure network automation workflows - Automation plays a critical role in modern networks. It helps network engineers manage networks with fewer repetitive manual tasks for greater agility. Network engineers cannot automate - or secure - what they don't understand. Understanding network ...
1 year ago Techtarget.com
NetSecOps best practices for network engineers - DevOps culture reduces blame games in work environments, encouraging network engineers, developers and all stakeholders to work together by learning, sharing and collaborating. NetSecOps is a term used to explain the integration of workflows for ...
1 year ago Techtarget.com
Darktrace and Garland Technology Collaborate to Help Businesses Secure Operational Technology Environments - PRESS RELEASE. CAMBRIDGE, England, Jan. 24, 2024 /PRNewswire/ - Darktrace, a global leader in cyber security AI, and Garland Technology, a leading manufacturer of network TAP, aggregator, packet broker, data diode and inline bypass solutions, today ...
1 year ago Darkreading.com
10 Best Free Blue Team Tools in 2025 - IT security experts utilize blue team tools to protect against simulated cyber threats launched by the “red team” to improve cybersecurity and penetration testing procedures. Sigma is a blue team tool for creating and using signatures ...
1 month ago Cybersecuritynews.com
What Is Container Security? Definition, Benefits, and Risks - Container security is a vital factor for all companies that use containers for running their software, as an alternative to using virtual machines. Container security is a total of policies and tools that are applied to maintain a container running ...
2 years ago Heimdalsecurity.com
How many types of Network Security protocols exist - Network Security protocols are designed to safeguard computer networks from unauthorized access, data breaches, and other cyber threats. Secure Sockets Layer / Transport Layer Security: SSL and its successor TLS are cryptographic protocols that ...
1 year ago Cybersecurity-insiders.com
GitHub code-signing certificates stolen - Another day, another access-token-based database breach. This time, the victim is Microsoft's GitHub business. On December 6, 2022, repositories from our atom, desktop, and other deprecated GitHub-owned organizations were cloned by a compromised ...
2 years ago Nakedsecurity.sophos.com

Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)