[CIVN-2025-0374] Security Restriction Bypass Vulnerability in Synology DiskStation Manager

By Published On: December 18, 2025

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Security Restriction Bypass Vulnerability in Synology DiskStation Manager 
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
DSM version prior to 7.3.1-86003-1
DSM version prior to 7.2.2-72806-5
Overview
A vulnerability has been identified in Synology DiskStation Manager (DSM), which could allow a remote attacker to bypass security restrictions on the targeted system.
Target Audience:
Users and administrators of affected Synology DiskStation Manager (DSM) installations.
Risk Assessment:
Risk of unauthorized access and sensitive information disclosure.
Impact Assessment:
Exploitation could allow disclosure of sensitive user information.
Description
Synology DiskStation Manager (DSM) is a Linux-based operating system that provides a centralized platform for managing storage, files, applications, and services on Synology NAS devices.
The vulnerability exists due to a flaw in the authentication logic of DSM, where knowledge of a valid LDAP distinguished name (DN) may cause the system to incorrectly treat an unauthenticated request as authenticated. This improper handling can allow an attacker to bypass intended security restrictions.
Successful exploitation of the vulnerability could allow a remote attacker to trigger security restriction bypass on the targeted system.
Solution
Apply appropriate fixes as mentioned in Synology Security Advisory:
https://www.synology.com/en-us/security/advisory/Synology_SA_25_14
Vendor Information
 
https://www.synology.com/en-us/security/advisory/Synology_SA_25_14
CVE Name
CVE-2025-13392
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=Of1a
—–END PGP SIGNATURE—–

Share this article