Description
The DDNS function uses an insecure HTTP connection or fails to validate the SSL/TLS certificate when querying an external server for the device's WAN IP address. An unauthenticated remote attacker can perform a Man-in-the-Middle (MitM) attack to spoof the response, leading the device to update its DDNS record with an incorrect IP address.
Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.ROF1 as well as from ADM 5.0.0 through ADM 5.1.1.RCI1.
Published: 2026-02-03
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Man‑in‑the‑Middle spoofed DDNS IP
Action: Immediate Patch
AI Analysis

Impact

The vulnerability arises when the Dynamic DNS (DDNS) feature of the ASUSTOR ADM product uses an insecure HTTP connection or fails to perform proper SSL/TLS certificate validation while querying an external server for the device’s WAN IP address. This flaw enables an unauthenticated attacker to mount a man‑in‑the‑middle attack, inject a rogue response, and cause the device to record an incorrect IP address in its DDNS record. The result is a broken or hijacked external address that can be used to redirect traffic, deny service, or compromise remote connections that rely on the DDNS entry. The weakness is a classic certificate‑validation failure, mapped to CWE‑295.

Affected Systems

ASUSTOR Data Master Management (ADM) devices running firmware versions 4.1.0 through 4.3.3.ROF1, and 5.0.0 through 5.1.1.RCI1 are affected. The issue is present in the DDNS component of the ADM server software and applies to all devices within those version ranges.

Risk and Exploitability

The CVSS base score is 6.3, indicating a moderate risk. The EPSS score of less than 1% shows that current exploitation likelihood is very low, and the vulnerability is not listed in the CISA KEV catalog. Nevertheless, the attack does not require authentication and can be performed remotely by any entity that can reach the device’s DDNS server, making the channel available for opportunistic exploitation. If an attacker succeeds, the wrong WAN IP can be propagated globally, affecting services that depend on reliable DDNS resolution.

Generated by OpenCVE AI on April 18, 2026 at 00:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update ADM firmware to a fixed version as released by ASUSTOR.
  • If an update is not immediately possible, disable the DDNS feature or reconfigure it to use a validated HTTPS endpoint that enforces strict certificate checks.
  • Periodically review ADM logs for unexpected DDNS updates and verify that the recorded IP address matches the actual WAN IP address.

Generated by OpenCVE AI on April 18, 2026 at 00:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 19 Feb 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Asustor data Master
CPEs cpe:2.3:o:asustor:data_master:*:*:*:*:*:*:*:*
Vendors & Products Asustor data Master
Metrics cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Asustor
Asustor adm
Vendors & Products Asustor
Asustor adm

Tue, 03 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 03 Feb 2026 13:15:00 +0000

Type Values Removed Values Added
Description The DDNS function uses an insecure HTTP connection or fails to validate the SSL/TLS certificate when querying an external server for the device's WAN IP address. An unauthenticated remote attacker can perform a Man-in-the-Middle (MitM) attack to spoof the response, leading the device to update its DDNS record with an incorrect IP address. Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.ROF1 as well as from ADM 5.0.0 through ADM 5.1.1.RCI1.
Title An improper certificate validation vulnerability was found in ADM while querying an external server for the device's WAN IP address.
Weaknesses CWE-295
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: ASUSTOR1

Published:

Updated: 2026-02-03T15:31:00.835Z

Reserved: 2026-01-28T08:40:24.461Z

Link: CVE-2026-24934

cve-icon Vulnrichment

Updated: 2026-02-03T15:26:06.272Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-03T03:15:53.383

Modified: 2026-02-19T18:18:18.590

Link: CVE-2026-24934

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T00:30:25Z

Weaknesses