Lucene search

K
cve[email protected]CVE-2016-6554
HistoryJul 13, 2018 - 8:29 p.m.

CVE-2016-6554

2018-07-1320:29:00
CWE-255
web.nvd.nist.gov
21
synology nas
cve-2016-6554
ds107
ds116
firmware vulnerability
default credentials
remote network attack

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.003 Low

EPSS

Percentile

67.9%

Synology NAS servers DS107, firmware version 3.1-1639 and prior, and DS116, DS213, firmware versions prior to 5.2-5644-1, use non-random default credentials of: guest:(blank) and admin:(blank) . A remote network attacker can gain privileged access to a vulnerable device.

Affected configurations

NVD
Node
synologyds107_firmwareRange3.1-1639
AND
synologyds107Match-
Node
synologyds213_firmwareRange5.2-5644-1
AND
synologyds213Match-
Node
synologyds116_firmwareRange5.2-5644-1
AND
synologyds116Match-

CNA Affected

[
  {
    "product": "NAS server DS107",
    "vendor": "Synology",
    "versions": [
      {
        "lessThanOrEqual": "3.1-1639",
        "status": "affected",
        "version": "3.1-1639",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "NAS server DS116",
    "vendor": "Synology",
    "versions": [
      {
        "lessThan": "5.2-5644-1",
        "status": "affected",
        "version": "5.2-5644-1",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "NAS server DS213",
    "vendor": "Synology",
    "versions": [
      {
        "lessThan": "5.2-5644-1",
        "status": "affected",
        "version": "5.2-5644-1",
        "versionType": "custom"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.003 Low

EPSS

Percentile

67.9%

Related for CVE-2016-6554