CVE-2023-0142: Assigned by Synology, this vulnerability affects DSM, DSMUC, and SRM. It allows remote authenticated users to read or write arbitrary files. CVSS base score: 6.5.
This CVE-2023-0142, assigned by Synology, was published on June 13, 2023. It falls under the problem type CWE-427: Uncontrolled Search Path Element.
Understanding CVE-2023-0142
This vulnerability affects various products under Synology, including DiskStation Manager (DSM), Unified Controller (DSMUC), and Synology Router Manager (SRM).
What is CVE-2023-0142?
The CVE-2023-0142 vulnerability involves an uncontrolled search path element in the Backup Management Functionality of Synology DiskStation Manager (DSM) before version 7.1-42661. It allows remote authenticated users to read or write arbitrary files through unspecified vectors.
The Impact of CVE-2023-0142
The impact of this vulnerability is rated as medium with a CVSS base score of 6.5. Attackers with high privileges can exploit this vulnerability to compromise the confidentiality and integrity of the affected systems.
Technical Details of CVE-2023-0142
This section provides a detailed overview of the vulnerability.
Vulnerability Description
The uncontrolled search path element vulnerability in Backup Management Functionality in Synology DiskStation Manager (DSM) allows remote authenticated users to read or write arbitrary files via unspecified vectors.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by remote authenticated users to gain unauthorized access and manipulate files on the affected systems.
Mitigation and Prevention
To address CVE-2023-0142, follow these mitigation and prevention measures.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ensure that all Synology products, including DiskStation Manager (DSM), Unified Controller (DSMUC), and Synology Router Manager (SRM), are updated to the latest versions to mitigate the risk of exploitation.