A popular device and application used by millions of individuals and businesses around the world to store documents is vulnerable to a zero-click flaw, a group of Dutch researchers have discovered.
The vulnerability, which is called zero-click because it doesn’t require a user to click on anything to be infected, affects a photo application installed by default on popular network-attached storage (NAS) devices made by the Taiwanese firm Synology. The bug would allow attackers to gain access to the devices to steal personal and corporate files, plant a backdoor, or infect the systems with ransomware to prevent users from accessing their data.
The SynologyPhotos application package comes preinstalled and enabled by default on Synology’s line of BeeStation storage devices but is also a popular application downloaded by users of its DiskStation storage systems, which allow users to augment their storage capacity with removable components. Several ransomware groups have targeted network-attached storage devices made by Synology and others in recent years, going back to at least 2019. Earlier this year, users of Synology’s DiskStation system specifically reported being hit with ransomware.
Rick de Jager, a security researcher at Midnight Blue in the Netherlands, discovered the vulnerability in two hours as part of the Pwn2Own hacking contest in Ireland. He and colleagues Carlo Meijer, Wouter Bokslag, and Jos Wetzels conducted a scan of internet-connected devices and uncovered hundreds of thousands of Synology NASes connected online that are vulnerable to the attack. The researchers say, however, that millions of other devices are potentially vulnerable and accessible to the attack.
They, along with the Pwn2Own organizers, notified Synology about the vulnerability last week.
Network-attached storage systems are considered high-value targets for ransomware operators because they store large volumes of data. Many users connect them directly to the internet from their own networks or use Synology’s cloud storage to back up data to these systems online. The researchers tell WIRED that while the systems can be set up with a gateway that requires credentials to access them, the part of the photo application that contains the zero-click vulnerability does not require authentication, so attackers can exploit the vulnerability directly over the internet without needing to bypass a gateway. The vulnerability gives them root access to install and execute any malicious code on the device.