CVE-2024-10442
Published: 19 March 2025
Summary
CVE-2024-10442 is a critical-severity Off-by-one Error (CWE-193) vulnerability in Synology Diskstation Manager. Its CVSS base score is 10.0 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 5.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and RA-5 (Vulnerability Monitoring and Scanning).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates timely remediation of the off-by-one error vulnerability in Synology Replication Service via patching to fixed versions, preventing remote arbitrary code execution.
Requires vulnerability scanning to identify affected Synology Replication Service and DSMUC versions, enabling proactive patching before exploitation.
Enforces boundary protection to restrict network access to the vulnerable transmission component, reducing exposure to remote unauthenticated attackers.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes a remote, unauthenticated arbitrary code execution vulnerability in a network-accessible service (Synology Replication Service), which directly maps to exploitation of public-facing applications for initial access.
NVD Description
Off-by-one error vulnerability in the transmission component in Synology Replication Service before 1.0.12-0066, 1.2.2-0353 and 1.3.0-0423 and Synology Unified Controller (DSMUC) before 3.1.4-23079 allows remote attackers to execute arbitrary code, potentially leading to a broader impact across the system via…
more
unspecified vectors.
Deeper analysisAI
CVE-2024-10442 is an off-by-one error (CWE-193) in the transmission component of Synology Replication Service versions prior to 1.0.12-0066, 1.2.2-0353, and 1.3.0-0423, as well as Synology Unified Controller (DSMUC) versions prior to 3.1.4-23079. This vulnerability enables remote attackers to execute arbitrary code via unspecified vectors, with a maximum CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), indicating critical severity due to its network accessibility, lack of prerequisites, and potential for complete system compromise.
Remote, unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation grants arbitrary code execution on the affected component, potentially escalating to broader system-wide impact, including high confidentiality, integrity, and availability disruptions across the targeted Synology systems.
Synology's security advisory (Synology_SA_24_22) details mitigation through updating to the fixed versions: Synology Replication Service 1.0.12-0066, 1.2.2-0353, or 1.3.0-0423, and DSMUC 3.1.4-23079 or later. Security practitioners should prioritize patching affected installations and monitor for unusual network activity on exposed Replication Service ports.
Details
- CWE(s)