HomeVulnerabilitySynology fixes BeeStation zero-days demoed at Pwn2Own Eire

Synology fixes BeeStation zero-days demoed at Pwn2Own Eire

Synology has addressed a critical-severity distant code execution (RCE) vulnerability in BeeStation merchandise that was demonstrated on the latest Pwn2Own hacking competitors.

The security challenge (CVE-2025-12686) is described as a ‘buffer copy with out checking the scale of enter’ drawback, and will be exploited to permit arbitrary code execution.

It impacts a number of variations of BeeStation OS, the software program powering Synology’s network-attached storage (NAS) units marketed as a consumer-oriented  “private cloud.”

Wiz

There are not any mitigations out there, so the seller recommends that customers improve to the next variations, which handle :

  • BeeStation OS model 1.3.2-65648 or above
  • BeeStation OS model 1.3.2-65648 or above
  • BeeStation OS model 1.3.2-65648 or above
  • BeeStation OS model 1.3.2-65648 or above

Researchers Tek and anyfun at French cybersecurity firm Synacktiv exploited the flaw in an illustration in the course of the Pwn2Own Eire 2025 contest on October twenty first. For his or her profitable exploitation, the 2 researchers acquired a $40,000 reward.

See also  Juniper Firewalls, Openfire, and Apache RocketMQ Underneath Attack from New Exploits

tweet

A 3-day hacking competitors organized by Development Micro and the Zero Day Initiative (ZDI), Pwn2Own provides security researchers the chance to hack standard client units utilizing zero-day vulnerabilities.

The newest occasion held in Eire had researchers demonstrating 73 zero-day flaws throughout a broad vary of merchandise and successful greater than $1 million.

Final week, one other main NAS vendor, QNAP, mounted a complete of seven zero-day vulnerabilities in a number of units from the corporate, which white-hat hackers had proven at Pwn2Own Eire this 12 months.

ZDI has a disclosure settlement with corporations collaborating in Pwn2Own and holds off publishing the technical particulars of the security points till patches can be found and customers have had ample time to use the updates.

Extra particulars about these flaws will likely be disclosed within the coming months on ZDI’s bulletin board and, in some circumstances, on private weblog areas of the researchers themselves.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular