Important Information about "libupnp: write files via POST" (CVE-2016-6255)

Publish Time: 2016-07-18 00:00:00 UTC+8

Last Updated: 2016-07-18 12:00:00 UTC+8

Severity
Critical
Status
Resolved

Description

On July 18th, a vulnerability regarding libupnp was discovered. This vulnerability results in unauthorized file transfer from/to the system when UPnP-related services are running. Affected products and features include:

  • All DSM versions prior to DSM 6.0.1-2
  • Control Panel > External Access > Router Configuration
  • QuickConnect
  • USB Wi-Fi dongles installed for hotspots
  • Any other UPnP-related packages
    • Audio Station
    • Video Station
    • Media Server
    • Download Station

Severity

Critical

Mitigation

Please configure firewall settings and allow UPnP access for trusted network only.

Update Availability

Synology has released DSM 6.0.1-2 to address the issue.

References

https://github.com/mjg59/pupnp-code/commit/be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd