Impact
The vulnerability stems from a misconfigured local HTTP server that runs on the loopback interface within the Synology SSL VPN Client. A malicious craft of a web page can be used by an attacker to cause the client to serve files from its installation directory, exposing sensitive artifacts such as configuration files, certificates, and logs. The primary impact is the disclosure of confidential data, while system integrity and availability remain unaffected.
Affected Systems
All Synology SSL VPN Client installations with a version prior to 1.4.5‑0684 are affected. The flaw is confined to the SSL VPN Client component and does not impact other Synology products or alternative VPN clients.
Risk and Exploitability
The CVSS base score of 6.5 indicates a medium severity vulnerability. EPSS data is unavailable and the issue is not listed in the CISA KEV catalog, suggesting a lower immediate exploitation probability. The attack requires the victim to interact with a malicious web page while the client is running and does not provide remote code execution or denial of service.
OpenCVE Enrichment