ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Helping people and organizations manage, share, and protect their data regardless of scale, infrastructure, or expertise.

Synology A.I CyberSecurity Scoring

Synology

Company Details

Linkedin ID:

synology

Employees number:

928

Number of followers:

28,868

NAICS:

5415

Industry Type:

IT Services and IT Consulting

Homepage:

synology.com

IP Addresses:

0

Company ID:

SYN_4864898

Scan Status:

In-progress

AI scoreSynology Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/synology.jpeg
Synology IT Services and IT Consulting
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreSynology Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/synology.jpeg
Synology IT Services and IT Consulting
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Synology Company CyberSecurity News & History

Past Incidents
3
Attack Types
2
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
SynologyRansomware75207/2019
Rankiteo Explanation :
Attack limited on finance or reputation

Description: Synology warned users to strengthen the passwords to their network attached storage (NAS) after several devices capable of storing terabytes of data were encrypted by ransomware. The attackers demanded 0.06 Bitcoin, then worth around $350, to regain access to files. After an intensive investigation into this matter, the company found that the attacker used botnet addresses to hide the real source IP. The firm recommended customers use Synology's network and account management settings to prevent the internet-based attacks.

SynologyVulnerability6013/2025
Rankiteo Explanation :
Attack without any consequences

Description: Synology Mail Server recently disclosed a moderate-severity vulnerability tracked as CVE-2025-2848, affecting DSM 7.1 and 7.2 versions. The flaw allowed remote authenticated attackers to adjust non-sensitive settings and disable some non-critical features. While there were no reports of data compromise or critical system disruption, the potential to manipulate system configurations did exist. Synology promptly released security patches to address the vulnerability, urging users to update their servers to protect their systems from potential exploitation. The oversight in access control underscores the importance of ongoing vigilance and immediate response to identified security issues within network-connected storage solutions.

SynologyVulnerability100411/2024
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Synology's network-attached storage (NAS) devices, specifically the widely used SynologyPhotos application on BeeStation and DiskStation systems, suffer from a critical zero-click vulnerability. If exploited, attackers could gain unauthorized root access to the devices, enabling them to steal personal and corporate files, plant backdoors, or deploy ransomware, severely impeding user access to stored data. The flaw was discovered during the Pwn2Own contest and exposes potentially millions of internet-connected Synology NAS devices to significant risk. Although the issue has been reported to Synology, the widespread use of their storage solutions and the severity of the potential data breaches present a concerning scenario for both individual and corporate users.

Synology
Ransomware
Severity: 75
Impact: 2
Seen: 07/2019
Blog:
Rankiteo Explanation
Attack limited on finance or reputation

Description: Synology warned users to strengthen the passwords to their network attached storage (NAS) after several devices capable of storing terabytes of data were encrypted by ransomware. The attackers demanded 0.06 Bitcoin, then worth around $350, to regain access to files. After an intensive investigation into this matter, the company found that the attacker used botnet addresses to hide the real source IP. The firm recommended customers use Synology's network and account management settings to prevent the internet-based attacks.

Synology
Vulnerability
Severity: 60
Impact: 1
Seen: 3/2025
Blog:
Rankiteo Explanation
Attack without any consequences

Description: Synology Mail Server recently disclosed a moderate-severity vulnerability tracked as CVE-2025-2848, affecting DSM 7.1 and 7.2 versions. The flaw allowed remote authenticated attackers to adjust non-sensitive settings and disable some non-critical features. While there were no reports of data compromise or critical system disruption, the potential to manipulate system configurations did exist. Synology promptly released security patches to address the vulnerability, urging users to update their servers to protect their systems from potential exploitation. The oversight in access control underscores the importance of ongoing vigilance and immediate response to identified security issues within network-connected storage solutions.

Synology
Vulnerability
Severity: 100
Impact: 4
Seen: 11/2024
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Synology's network-attached storage (NAS) devices, specifically the widely used SynologyPhotos application on BeeStation and DiskStation systems, suffer from a critical zero-click vulnerability. If exploited, attackers could gain unauthorized root access to the devices, enabling them to steal personal and corporate files, plant backdoors, or deploy ransomware, severely impeding user access to stored data. The flaw was discovered during the Pwn2Own contest and exposes potentially millions of internet-connected Synology NAS devices to significant risk. Although the issue has been reported to Synology, the widespread use of their storage solutions and the severity of the potential data breaches present a concerning scenario for both individual and corporate users.

Ailogo

Synology Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Synology

Incidents vs IT Services and IT Consulting Industry Average (This Year)

Synology has 78.57% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Synology has 53.85% more incidents than the average of all companies with at least one recorded incident.

Incident Types Synology vs IT Services and IT Consulting Industry Avg (This Year)

Synology reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 1 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.

Incident History — Synology (X = Date, Y = Severity)

Synology cyber incidents detection timeline including parent company and subsidiaries

Synology Company Subsidiaries

SubsidiaryImage

Helping people and organizations manage, share, and protect their data regardless of scale, infrastructure, or expertise.

Loading...
similarCompanies

Synology Similar Companies

Amadeus

We make the experience of travel better for everyone, everywhere by inspiring innovation, partnerships and responsibility to people, places and planet. Our technology powers the travel and tourism industry. We inspire more connected ways of thinking, centered around the traveler. Our platform c

Hitachi

Since its founding in 1910, Hitachi has responded to the expectations of society and its customers through technology and innovation. Our mission is to “Contribute to society through the development of superior, original technology and products.” Over the past 100+ years this commitment has led us t

Zebra Technologies

Zebra (NASDAQ: ZBRA) helps organizations monitor, anticipate, and accelerate workflows by empowering their frontline and ensuring that everyone and everything is visible, connected and fully optimized. Our award-winning portfolio spans software to innovations in robotics, machine vision, automation

Somos especializados em integrar tecnologia com inteligência humana, oferecendo soluções digitais que promovem transformação e eficiência operacional. Nosso foco é gerar valor por meio de resultados reais, utilizando inteligência digital para atender às necessidades específicas de cada cliente. Merg

Asurion

As the world’s leading tech care company, Asurion eliminates the fears and frustrations associated with technology, to ensure our 300 million customers get the most out of their devices, appliances and connections. We provide insurance, repair, replacement, installation and 24/7 support for everythi

Canon EMEA

We are Canon Europe. We are the world's best imaging company. This page represents our offices in Europe, the Middle East and Africa. Founded in 1937, the desire to continuously innovate has kept Canon at the forefront of imaging excellence throughout its 85-year history and has commitments to inve

iSoftStone is a global IT service and consulting company‚ÄØthat creates value and drives success through technology solutions, service excellence, and digital innovation. We specialize in web and application development, software testing and support, data and content management, digital experience,

GlobalLogic Latinoamérica

GlobalLogic, una empresa del grupo Hitachi, es líder en ingeniería digital en Latinoamérica. Ayudamos a diferentes marcas a diseñar y crear productos, plataformas y experiencias digitales innovadoras para el mundo moderno. Al integrar el diseño de experiencia, la ingeniería compleja y la exper

NTT DATA, Inc.

NTT DATA, Inc. is a trusted global innovator of business and technology services. We're committed to helping clients innovate, optimize and transform for long-term success. Our R&D investments help organizations and society move confidently and sustainably into the digital future. As a Global Top Em

newsone

Synology CyberSecurity News

November 23, 2025 11:00 PM
Exclusive: Synology’s Thachawan Chinchanakarn on 2025 risks

Synology has warned that Southeast Asian businesses are expanding digital initiatives faster than they can secure them, creating widening...

November 20, 2025 03:20 PM
Cisco, ASUS, QNAP, and Synology devices hijacked to major botnet

Sekoia spots hackers abusing a known flaw in Cisco devices; This leads to the discovery of a botnet called PolarEdge; Most victims are found in the US,...

November 11, 2025 08:00 AM
Synology BeeStation 0-Day Vulnerability Lets Remote Attackers Execute Arbitrary Code

Synology has issued a critical security update to address a severe vulnerability affecting BeeStation OS, disclosed during PWN2OWN 2025.

November 11, 2025 08:00 AM
Synology BeeStation 0-Day Vulnerability Let Remote Attackers Execute Arbitrary Code

Synology released update addressing a remote code execution vulnerability in BeeStation OS that allows attackers to execute arbitrary code.

November 05, 2025 08:00 AM
Synology boosts global security with Pwn2Own Ireland 2025 role

Synology will join Pwn2Own Ireland 2025, reinforcing its commitment to global data security through collaboration with leading cybersecurity...

November 05, 2025 08:00 AM
Synology strengthens product security through global collaboration at Pwn2Own Ireland 2025

Storage, network, and security hardware provider Synology has announced its participation in Pwn2Own Ireland 2025 and extended its...

November 02, 2025 07:00 AM
On Its 25th Year, Synology expands data management solutions in the Philippines

TWENTY years of expertise in data management makes Synology the “OG” of network storage access. The company's DNA, rooted in digital...

October 31, 2025 07:00 AM
Synology strengthens cybersecurity, data management in Phl

Taiwan–based data management solution company Synology Inc. recently held Synology Solution Day 2025 on 23 October 2025, at SPACE in One...

October 28, 2025 05:30 PM
Trend Micro Celebrates Pwn2Own Ireland with Cybersecurity Research & Zero-day Vulnerabilities

Trend Micro announced the efforts of the global security research community at Pwn2Own Ireland. Contestants discovered and disclosed 73...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Synology CyberSecurity History Information

Official Website of Synology

The official website of Synology is http://www.synology.com.

Synology’s AI-Generated Cybersecurity Score

According to Rankiteo, Synology’s AI-generated cybersecurity score is 728, reflecting their Moderate security posture.

How many security badges does Synology’ have ?

According to Rankiteo, Synology currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Synology have SOC 2 Type 1 certification ?

According to Rankiteo, Synology is not certified under SOC 2 Type 1.

Does Synology have SOC 2 Type 2 certification ?

According to Rankiteo, Synology does not hold a SOC 2 Type 2 certification.

Does Synology comply with GDPR ?

According to Rankiteo, Synology is not listed as GDPR compliant.

Does Synology have PCI DSS certification ?

According to Rankiteo, Synology does not currently maintain PCI DSS compliance.

Does Synology comply with HIPAA ?

According to Rankiteo, Synology is not compliant with HIPAA regulations.

Does Synology have ISO 27001 certification ?

According to Rankiteo,Synology is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Synology

Synology operates primarily in the IT Services and IT Consulting industry.

Number of Employees at Synology

Synology employs approximately 928 people worldwide.

Subsidiaries Owned by Synology

Synology presently has no subsidiaries across any sectors.

Synology’s LinkedIn Followers

Synology’s official LinkedIn profile has approximately 28,868 followers.

NAICS Classification of Synology

Synology is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.

Synology’s Presence on Crunchbase

No, Synology does not have a profile on Crunchbase.

Synology’s Presence on LinkedIn

Yes, Synology maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/synology.

Cybersecurity Incidents Involving Synology

As of December 08, 2025, Rankiteo reports that Synology has experienced 3 cybersecurity incidents.

Number of Peer and Competitor Companies

Synology has an estimated 37,221 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Synology ?

Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability and Ransomware.

How does Synology detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with strengthen passwords, use synology's network and account management settings, and remediation measures with security patches released..

Incident Details

Can you provide details on each incident ?

Incident : Ransomware

Title: Synology NAS Ransomware Attack

Description: Synology warned users to strengthen the passwords to their network attached storage (NAS) after several devices capable of storing terabytes of data were encrypted by ransomware. The attackers demanded 0.06 Bitcoin, then worth around $350, to regain access to files. After an intensive investigation into this matter, the company found that the attacker used botnet addresses to hide the real source IP. The firm recommended customers use Synology's network and account management settings to prevent the internet-based attacks.

Type: Ransomware

Attack Vector: Internet-based attacks

Motivation: Financial gain

Incident : Zero-Click Vulnerability

Title: Synology NAS Zero-Click Vulnerability

Description: Synology's network-attached storage (NAS) devices, specifically the widely used SynologyPhotos application on BeeStation and DiskStation systems, suffer from a critical zero-click vulnerability. If exploited, attackers could gain unauthorized root access to the devices, enabling them to steal personal and corporate files, plant backdoors, or deploy ransomware, severely impeding user access to stored data. The flaw was discovered during the Pwn2Own contest and exposes potentially millions of internet-connected Synology NAS devices to significant risk. Although the issue has been reported to Synology, the widespread use of their storage solutions and the severity of the potential data breaches present a concerning scenario for both individual and corporate users.

Type: Zero-Click Vulnerability

Attack Vector: Network-Attached Storage (NAS) Devices

Vulnerability Exploited: SynologyPhotos application on BeeStation and DiskStation systems

Incident : Vulnerability Exploitation

Title: Synology Mail Server Vulnerability (CVE-2025-2848)

Description: A moderate-severity vulnerability in Synology Mail Server, tracked as CVE-2025-2848, affected DSM 7.1 and 7.2 versions, allowing remote authenticated attackers to adjust non-sensitive settings and disable some non-critical features.

Type: Vulnerability Exploitation

Attack Vector: Remote Authenticated

Vulnerability Exploited: CVE-2025-2848

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Botnet addresses.

Impact of the Incidents

What was the impact of each incident ?

Incident : Ransomware SYN15271423

Systems Affected: Network attached storage (NAS) devices

Incident : Zero-Click Vulnerability SYN000110224

Data Compromised: Personal files, Corporate files

Systems Affected: Synology NAS devices

Incident : Vulnerability Exploitation SYN320032725

Systems Affected: Synology Mail Server

Operational Impact: Non-sensitive settings adjustment and non-critical features disabled

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Files, Corporate Files and .

Which entities were affected by each incident ?

Incident : Ransomware SYN15271423

Entity Name: Synology

Entity Type: Company

Industry: Technology

Incident : Zero-Click Vulnerability SYN000110224

Entity Name: Synology

Entity Type: Company

Industry: Technology

Incident : Vulnerability Exploitation SYN320032725

Entity Name: Synology

Entity Type: Company

Industry: Storage Solutions

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Ransomware SYN15271423

Remediation Measures: Strengthen passwords, use Synology's network and account management settings

Incident : Vulnerability Exploitation SYN320032725

Remediation Measures: Security patches released

Data Breach Information

What type of data was compromised in each breach ?

Incident : Ransomware SYN15271423

Data Encryption: Ransomware encrypted data

Incident : Zero-Click Vulnerability SYN000110224

Type of Data Compromised: Personal files, Corporate files

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Strengthen passwords, use Synology's network and account management settings, Security patches released.

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Ransomware SYN15271423

Ransom Demanded: 0.06 Bitcoin

Data Encryption: Yes

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : Vulnerability Exploitation SYN320032725

Lessons Learned: Importance of ongoing vigilance and immediate response to identified security issues within network-connected storage solutions.

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are Importance of ongoing vigilance and immediate response to identified security issues within network-connected storage solutions.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Ransomware SYN15271423

Investigation Status: Completed

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Ransomware SYN15271423

Customer Advisories: Use Synology's network and account management settings

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Use Synology's network and account management settings.

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Ransomware SYN15271423

Entry Point: Botnet addresses

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Ransomware SYN15271423

Root Causes: Weak passwords

Corrective Actions: Strengthen passwords, use Synology's network and account management settings

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Strengthen passwords, use Synology's network and account management settings.

Additional Questions

General Information

What was the amount of the last ransom demanded ?

Last Ransom Demanded: The amount of the last ransom demanded was 0.06 Bitcoin.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were personal files, corporate files and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was Synology NAS devices and .

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were personal files and corporate files.

Ransomware Information

What was the highest ransom demanded in a ransomware incident ?

Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was 0.06 Bitcoin.

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Importance of ongoing vigilance and immediate response to identified security issues within network-connected storage solutions.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Completed.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued was an Use Synology's network and account management settings.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Botnet addresses.

cve

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability has been found in TykoDev cherry-studio-TykoFork 0.1. This issue affects the function redirectToAuthorization of the file /.well-known/oauth-authorization-server of the component OAuth Server Discovery. Such manipulation of the argument authorizationUrl leads to os command injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in code-projects Question Paper Generator up to 1.0. This vulnerability affects unknown code of the file /selectquestionuser.php. This manipulation of the argument subid causes sql injection. Remote exploitation of the attack is possible. The exploit has been published and may be used.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected by this vulnerability is an unknown functionality of the file /dishsub.php. The manipulation of the argument item.name results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 3.3
Severity: LOW
AV:N/AC:L/Au:M/C:N/I:P/A:N
cvss3
Base: 2.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability has been found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected is an unknown function of the file /usersub.php of the component Request Pending Page. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:N/I:P/A:N
cvss3
Base: 3.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in Verysync 微力同步 up to 2.21.3. This impacts an unknown function of the file /rest/f/api/resources/f96956469e7be39d/tmp/text.txt?override=false of the component Web Administration Module. Executing manipulation can lead to unrestricted upload. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=synology' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge