Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.RKD2 as well as from ADM 5.0.0 through ADM 5.1.0.RN42.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 28 Jan 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Asustor data Master
|
|
| CPEs | cpe:2.3:o:asustor:data_master:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Asustor data Master
|
|
| Metrics |
cvssV3_1
|
Fri, 12 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 12 Dec 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Asustor
Asustor adm |
|
| Vendors & Products |
Asustor
Asustor adm |
Fri, 12 Dec 2025 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When the user set the Notification's sender to send emails to the SMTP server via msmtp, an improper validated TLS/SSL certificates allows an attacker who can intercept network traffic between the SMTP client and server to execute a man-in-the-middle (MITM) attack, which may obtain the sensitive information of the SMTP. Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.RKD2 as well as from ADM 5.0.0 through ADM 5.1.0.RN42. | |
| Title | An improper certificates validation vulnerability was found in the Notification settings of ADM | |
| Weaknesses | CWE-295 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: ASUSTOR1
Published:
Updated: 2025-12-12T18:17:24.167Z
Reserved: 2025-11-12T10:01:36.262Z
Link: CVE-2025-13052
Updated: 2025-12-12T18:17:21.294Z
Status : Analyzed
Published: 2025-12-12T03:15:50.070
Modified: 2026-01-28T14:53:53.883
Link: CVE-2025-13052
No data.
OpenCVE Enrichment
Updated: 2025-12-12T08:48:31Z