Out-of-bounds read in Synology Camera BC500 ,CC400W and TC500



Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-11131
CWE-ID CWE-125
Exploitation vector Network
Public exploit N/A
Vulnerable software
BC500
Hardware solutions / Office equipment, IP-phones, print servers

TC500
Hardware solutions / Office equipment, IP-phones, print servers

CC400W
Hardware solutions / Security hardware applicances

Vendor Synology Inc.

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Out-of-bounds read

EUVDB-ID: #VU107380

Risk: High

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2024-11131

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in the video interface within the implementation of the ONVIF protocol. A remote attacker can trigger an out-of-bounds read error and read contents of memory on the system, leading to arbitrary code execution.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

BC500: before 1.2.0-0525

CC400W: before 1.2.0-0525

TC500: before 1.2.0-0525

CPE2.3 External links

https://www.synology.com/en-global/security/advisory/Synology_SA_24_24
https://www.zerodayinitiative.com/advisories/ZDI-25-216/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###