Synology Mail Server recently disclosed a moderate-severity vulnerability tracked as CVE-2025-2848, affecting DSM 7.1 and 7.2 versions. The flaw allowed remote authenticated attackers to adjust non-sensitive settings and disable some non-critical features. While there were no reports of data compromise or critical system disruption, the potential to manipulate system configurations did exist. Synology promptly released security patches to address the vulnerability, urging users to update their servers to protect their systems from potential exploitation. The oversight in access control underscores the importance of ongoing vigilance and immediate response to identified security issues within network-connected storage solutions.
Source: https://cybersecuritynews.com/synology-mail-server-remote-attackers/
TPRM report: https://scoringcyber.rankiteo.com/company/synology
"id": "syn320032725",
"linkid": "synology",
"type": "Vulnerability",
"date": "3/2025",
"severity": "60",
"impact": "1",
"explanation": "Attack without any consequences"
{'affected_entities': [{'industry': 'Storage Solutions',
'name': 'Synology',
'type': 'Company'}],
'attack_vector': 'Remote Authenticated',
'description': 'A moderate-severity vulnerability in Synology Mail Server, '
'tracked as CVE-2025-2848, affected DSM 7.1 and 7.2 versions, '
'allowing remote authenticated attackers to adjust '
'non-sensitive settings and disable some non-critical '
'features.',
'impact': {'operational_impact': 'Non-sensitive settings adjustment and '
'non-critical features disabled',
'systems_affected': 'Synology Mail Server'},
'lessons_learned': 'Importance of ongoing vigilance and immediate response to '
'identified security issues within network-connected '
'storage solutions.',
'response': {'remediation_measures': 'Security patches released'},
'title': 'Synology Mail Server Vulnerability (CVE-2025-2848)',
'type': 'Vulnerability Exploitation',
'vulnerability_exploited': 'CVE-2025-2848'}