Abstract

A vulnerability allows remote attackers to obtain sensitive information via a susceptible version of Synology DiskStation Manager (DSM), Synology Router Manager (SRM), VPN Server or VPN Plus Server.

Affected Products

Product Severity Fixed Release Availability DSM 6.2 Important Ongoing DSM 6.1 Important Will be fixed in DSM 6.2. DSM 5.2 Important Will be fixed in DSM 6.2. SkyNAS Important Ongoing SRM 1.1 Important Ongoing VPN Server Important Ongoing VPN Plus Server Important Ongoing

Mitigation

If you need immediate assistance, please contact Synology technical support via https://account.synology.com/en-global/support.

Detail

CVE-2018-5389 Severity: Important CVSS3 Base Score: 7.4 CVSS3 Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N The Internet Key Exchange v1 main mode is vulnerable to offline dictionary or brute force attacks. Reusing a key pair across different versions and modes of IKE could lead to cross-protocol authentication bypasses. It is well known, that the aggressive mode of IKEv1 PSK is vulnerable to offline dictionary or brute force attacks. For the main mode, however, only an online attack against PSK authentication was thought to be feasible. This vulnerability could allow an attacker to recover a weak Pre-Shared Key or enable the impersonation of a victim host or network.



Reference

Revision