Cleartext transmission of sensitive information vulnerability in synorelayd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to spoof servers via an HTTP session.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.synology.com/security/advisory/Synology_SA_20_26 | Vendor Advisory | 
| https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1160 | Exploit Third Party Advisory | 
| https://www.synology.com/security/advisory/Synology_SA_20_26 | Vendor Advisory | 
| https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1160 | Exploit Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| AND | 
 
 | 
Configuration 3 (hide)
| AND | 
 
 | 
Configuration 4 (hide)
| AND | 
 
 | 
History
                    14 Jan 2025, 19:29
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:o:synology:diskstation_manager:*:*:*:*:*:*:*:* | 
Information
                Published : 2021-02-26 22:15
Updated : 2025-01-14 19:29
NVD link : CVE-2021-26564
Mitre link : CVE-2021-26564
CVE.ORG link : CVE-2021-26564
JSON object : View
Products Affected
                synology
- skynas
- skynas_firmware
- vs960hd_firmware
- vs960hd
- diskstation_manager
- uc3200
- diskstation_manager_unified_controller
CWE
                
                    
                        
                        CWE-319
                        
            Cleartext Transmission of Sensitive Information
