CVE-2016-6554
moderate-risk
Published 2018-07-13
Synology NAS servers DS107, firmware version 3.1-1639 and prior, and DS116, DS213, firmware versions prior to 5.2-5644-1, use non-random default credentials of: guest:(blank) and admin:(blank) . A remote network attacker can gain privileged access to a vulnerable device.
Do I need to act?
~
1.5% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (3)
Ds107 Firmware
Ds213 Firmware
Ds116 Firmware
Affected Vendors
References (6)
Third Party Advisory
https://www.kb.cert.org/vuls/id/404187
Third Party Advisory
https://www.securityfocus.com/bid/93805
Release Notes
https://www.synology.com/en-global/releaseNote/DS213
Third Party Advisory
https://www.kb.cert.org/vuls/id/404187
Third Party Advisory
https://www.securityfocus.com/bid/93805
Release Notes
https://www.synology.com/en-global/releaseNote/DS213
45
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
4/34 · Minimal
Exposure
9/34 · Low