
Image: RET2 Systems
A critical remote code execution (RCE) vulnerability has been disclosed in Synology’s DiskStation DS1823xs+, a popular NAS appliance favored by small businesses and IT professionals. Tracked as CVE-2024-10442 with a CVSS score of 10, this zero-click bug allows attackers on the local network to gain root access without authentication.
The flaw was successfully demonstrated at Pwn2Own Ireland 2024 by Jack Dates of RET2 Systems, who detailed the vulnerability and published a proof-of-concept exploit.
The issue lies in the Replication Service, specifically in the shared library libsynobtrfsreplicacore.so.7. The vulnerability stems from improper validation of user-supplied data, leading to an out-of-bounds write condition. This enables arbitrary code execution in the context of the root user, posing an immediate and serious risk to affected systems.
Because the vulnerability does not require authentication, it can be weaponized by any attacker with access to the same network segment — making it particularly dangerous in exposed or misconfigured environments.
The vulnerability affects multiple versions of Synology’s DiskStation Manager (DSM) and associated replication services. Synology has issued patches across supported versions:
- DSMUC 3.1 → Upgrade to 3.1.4-23079 or later
- DSM 7.2 Replication Service → 1.3.0-0423 or later
- DSM 7.1 Replication Service → 1.2.2-0353 or later
- DSM 6.2 Replication Service → 1.0.12-0066 or later
The researcher has made both the technical blog post and exploit code publicly available, significantly lowering the barrier for attackers to replicate the exploit.
As NAS devices become more central to business operations — storing critical backups, sensitive data, and virtual machines — users of the affected Synology products are strongly advised to apply the necessary updates to mitigate the risk of remote code execution attacks.