Search criteria

11 vulnerabilities found for BeeDrive by Synology

CVE-2025-8074 (GCVE-0-2025-8074)

Vulnerability from nvd – Published: 2025-12-04 15:17 – Updated: 2025-12-04 20:00
VLAI?
Summary
Origin validation error vulnerability in BeeDrive in Synology BeeDrive for desktop before 1.4.3-13973 allows local users to write arbitrary files with non-sensitive information via unspecified vectors.
CWE
  • CWE-346 - Origin Validation Error
Assigner
References
Impacted products
Vendor Product Version
Synology BeeDrive for desktop Affected: * , < 1.4.3-13973 (semver)
Create a notification for this product.
Credits
Sheikh Rishad
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-8074",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-04T18:55:07.532097Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-04T20:00:55.868Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "BeeDrive for desktop",
          "vendor": "Synology",
          "versions": [
            {
              "lessThan": "1.4.3-13973",
              "status": "affected",
              "version": "*",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Sheikh Rishad"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Origin validation error vulnerability in BeeDrive in Synology BeeDrive for desktop before 1.4.3-13973 allows local users to write arbitrary files with non-sensitive information via unspecified vectors."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-346",
              "description": "Origin Validation Error",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-04T15:17:42.891Z",
        "orgId": "db201096-a0cc-46c7-9a55-61d9e221bf01",
        "shortName": "synology"
      },
      "references": [
        {
          "name": "Synology-SA-25:09 BeeDrive for desktop",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_25_09"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "db201096-a0cc-46c7-9a55-61d9e221bf01",
    "assignerShortName": "synology",
    "cveId": "CVE-2025-8074",
    "datePublished": "2025-12-04T15:17:42.891Z",
    "dateReserved": "2025-07-23T05:57:54.758Z",
    "dateUpdated": "2025-12-04T20:00:55.868Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-54160 (GCVE-0-2025-54160)

Vulnerability from nvd – Published: 2025-12-04 15:14 – Updated: 2025-12-04 20:01
VLAI?
Summary
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in BeeDrive in Synology BeeDrive for desktop before 1.4.2-13960 allows local users to execute arbitrary code via unspecified vectors.
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
References
Impacted products
Vendor Product Version
Synology BeeDrive for desktop Affected: * , < 1.4.2-13960 (semver)
Create a notification for this product.
Credits
Zhao Runzi (赵润梓)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-54160",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-04T19:13:46.343075Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-04T20:01:05.043Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "BeeDrive for desktop",
          "vendor": "Synology",
          "versions": [
            {
              "lessThan": "1.4.2-13960",
              "status": "affected",
              "version": "*",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Zhao Runzi (\u8d75\u6da6\u6893)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper limitation of a pathname to a restricted directory (\u0027Path Traversal\u0027) vulnerability in BeeDrive in Synology BeeDrive for desktop before 1.4.2-13960 allows local users to execute arbitrary code via unspecified vectors."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-04T15:14:11.401Z",
        "orgId": "db201096-a0cc-46c7-9a55-61d9e221bf01",
        "shortName": "synology"
      },
      "references": [
        {
          "name": "Synology-SA-25:08 BeeDrive for desktop",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_25_08"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "db201096-a0cc-46c7-9a55-61d9e221bf01",
    "assignerShortName": "synology",
    "cveId": "CVE-2025-54160",
    "datePublished": "2025-12-04T15:14:11.401Z",
    "dateReserved": "2025-07-17T07:37:50.117Z",
    "dateUpdated": "2025-12-04T20:01:05.043Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-54159 (GCVE-0-2025-54159)

Vulnerability from nvd – Published: 2025-12-04 15:13 – Updated: 2025-12-04 20:01
VLAI?
Summary
Missing authorization vulnerability in BeeDrive in Synology BeeDrive for desktop before 1.4.2-13960 allows remote attackers to delete arbitrary files via unspecified vectors.
CWE
Assigner
References
Impacted products
Vendor Product Version
Synology BeeDrive for desktop Affected: * , < 1.4.2-13960 (semver)
Create a notification for this product.
Credits
Zhao Runzi (赵润梓)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-54159",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-04T19:46:09.745462Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-04T20:01:11.664Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "BeeDrive for desktop",
          "vendor": "Synology",
          "versions": [
            {
              "lessThan": "1.4.2-13960",
              "status": "affected",
              "version": "*",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Zhao Runzi (\u8d75\u6da6\u6893)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Missing authorization vulnerability in BeeDrive in Synology BeeDrive for desktop before 1.4.2-13960 allows remote attackers to delete arbitrary files via unspecified vectors."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-862",
              "description": "Missing Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-04T15:13:46.771Z",
        "orgId": "db201096-a0cc-46c7-9a55-61d9e221bf01",
        "shortName": "synology"
      },
      "references": [
        {
          "name": "Synology-SA-25:08 BeeDrive for desktop",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_25_08"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "db201096-a0cc-46c7-9a55-61d9e221bf01",
    "assignerShortName": "synology",
    "cveId": "CVE-2025-54159",
    "datePublished": "2025-12-04T15:13:46.771Z",
    "dateReserved": "2025-07-17T07:37:50.117Z",
    "dateUpdated": "2025-12-04T20:01:11.664Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-54158 (GCVE-0-2025-54158)

Vulnerability from nvd – Published: 2025-12-04 15:13 – Updated: 2025-12-04 20:01
VLAI?
Summary
Missing authentication for critical function vulnerability in BeeDrive in Synology BeeDrive for desktop before 1.4.2-13960 allows local users to execute arbitrary code via unspecified vectors.
CWE
  • CWE-306 - Missing Authentication for Critical Function
Assigner
References
Impacted products
Vendor Product Version
Synology BeeDrive for desktop Affected: * , < 1.4.2-13960 (semver)
Create a notification for this product.
Credits
Zhao Runzi (赵润梓) 李建申(https://lsr00ter.github.io)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-54158",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-04T19:13:48.441045Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-04T20:01:18.860Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "BeeDrive for desktop",
          "vendor": "Synology",
          "versions": [
            {
              "lessThan": "1.4.2-13960",
              "status": "affected",
              "version": "*",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Zhao Runzi (\u8d75\u6da6\u6893)"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "\u674e\u5efa\u7533\uff08https://lsr00ter.github.io\uff09"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Missing authentication for critical function vulnerability in BeeDrive in Synology BeeDrive for desktop before 1.4.2-13960 allows local users to execute arbitrary code via unspecified vectors."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-04T15:13:29.761Z",
        "orgId": "db201096-a0cc-46c7-9a55-61d9e221bf01",
        "shortName": "synology"
      },
      "references": [
        {
          "name": "Synology-SA-25:08 BeeDrive for desktop",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_25_08"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "db201096-a0cc-46c7-9a55-61d9e221bf01",
    "assignerShortName": "synology",
    "cveId": "CVE-2025-54158",
    "datePublished": "2025-12-04T15:13:29.761Z",
    "dateReserved": "2025-07-17T07:37:50.117Z",
    "dateUpdated": "2025-12-04T20:01:18.860Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-8074 (GCVE-0-2025-8074)

Vulnerability from cvelistv5 – Published: 2025-12-04 15:17 – Updated: 2025-12-04 20:00
VLAI?
Summary
Origin validation error vulnerability in BeeDrive in Synology BeeDrive for desktop before 1.4.3-13973 allows local users to write arbitrary files with non-sensitive information via unspecified vectors.
CWE
  • CWE-346 - Origin Validation Error
Assigner
References
Impacted products
Vendor Product Version
Synology BeeDrive for desktop Affected: * , < 1.4.3-13973 (semver)
Create a notification for this product.
Credits
Sheikh Rishad
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-8074",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-04T18:55:07.532097Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-04T20:00:55.868Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "BeeDrive for desktop",
          "vendor": "Synology",
          "versions": [
            {
              "lessThan": "1.4.3-13973",
              "status": "affected",
              "version": "*",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Sheikh Rishad"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Origin validation error vulnerability in BeeDrive in Synology BeeDrive for desktop before 1.4.3-13973 allows local users to write arbitrary files with non-sensitive information via unspecified vectors."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-346",
              "description": "Origin Validation Error",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-04T15:17:42.891Z",
        "orgId": "db201096-a0cc-46c7-9a55-61d9e221bf01",
        "shortName": "synology"
      },
      "references": [
        {
          "name": "Synology-SA-25:09 BeeDrive for desktop",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_25_09"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "db201096-a0cc-46c7-9a55-61d9e221bf01",
    "assignerShortName": "synology",
    "cveId": "CVE-2025-8074",
    "datePublished": "2025-12-04T15:17:42.891Z",
    "dateReserved": "2025-07-23T05:57:54.758Z",
    "dateUpdated": "2025-12-04T20:00:55.868Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-54160 (GCVE-0-2025-54160)

Vulnerability from cvelistv5 – Published: 2025-12-04 15:14 – Updated: 2025-12-04 20:01
VLAI?
Summary
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in BeeDrive in Synology BeeDrive for desktop before 1.4.2-13960 allows local users to execute arbitrary code via unspecified vectors.
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
References
Impacted products
Vendor Product Version
Synology BeeDrive for desktop Affected: * , < 1.4.2-13960 (semver)
Create a notification for this product.
Credits
Zhao Runzi (赵润梓)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-54160",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-04T19:13:46.343075Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-04T20:01:05.043Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "BeeDrive for desktop",
          "vendor": "Synology",
          "versions": [
            {
              "lessThan": "1.4.2-13960",
              "status": "affected",
              "version": "*",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Zhao Runzi (\u8d75\u6da6\u6893)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper limitation of a pathname to a restricted directory (\u0027Path Traversal\u0027) vulnerability in BeeDrive in Synology BeeDrive for desktop before 1.4.2-13960 allows local users to execute arbitrary code via unspecified vectors."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-04T15:14:11.401Z",
        "orgId": "db201096-a0cc-46c7-9a55-61d9e221bf01",
        "shortName": "synology"
      },
      "references": [
        {
          "name": "Synology-SA-25:08 BeeDrive for desktop",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_25_08"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "db201096-a0cc-46c7-9a55-61d9e221bf01",
    "assignerShortName": "synology",
    "cveId": "CVE-2025-54160",
    "datePublished": "2025-12-04T15:14:11.401Z",
    "dateReserved": "2025-07-17T07:37:50.117Z",
    "dateUpdated": "2025-12-04T20:01:05.043Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-54159 (GCVE-0-2025-54159)

Vulnerability from cvelistv5 – Published: 2025-12-04 15:13 – Updated: 2025-12-04 20:01
VLAI?
Summary
Missing authorization vulnerability in BeeDrive in Synology BeeDrive for desktop before 1.4.2-13960 allows remote attackers to delete arbitrary files via unspecified vectors.
CWE
Assigner
References
Impacted products
Vendor Product Version
Synology BeeDrive for desktop Affected: * , < 1.4.2-13960 (semver)
Create a notification for this product.
Credits
Zhao Runzi (赵润梓)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-54159",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-04T19:46:09.745462Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-04T20:01:11.664Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "BeeDrive for desktop",
          "vendor": "Synology",
          "versions": [
            {
              "lessThan": "1.4.2-13960",
              "status": "affected",
              "version": "*",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Zhao Runzi (\u8d75\u6da6\u6893)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Missing authorization vulnerability in BeeDrive in Synology BeeDrive for desktop before 1.4.2-13960 allows remote attackers to delete arbitrary files via unspecified vectors."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-862",
              "description": "Missing Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-04T15:13:46.771Z",
        "orgId": "db201096-a0cc-46c7-9a55-61d9e221bf01",
        "shortName": "synology"
      },
      "references": [
        {
          "name": "Synology-SA-25:08 BeeDrive for desktop",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_25_08"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "db201096-a0cc-46c7-9a55-61d9e221bf01",
    "assignerShortName": "synology",
    "cveId": "CVE-2025-54159",
    "datePublished": "2025-12-04T15:13:46.771Z",
    "dateReserved": "2025-07-17T07:37:50.117Z",
    "dateUpdated": "2025-12-04T20:01:11.664Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-54158 (GCVE-0-2025-54158)

Vulnerability from cvelistv5 – Published: 2025-12-04 15:13 – Updated: 2025-12-04 20:01
VLAI?
Summary
Missing authentication for critical function vulnerability in BeeDrive in Synology BeeDrive for desktop before 1.4.2-13960 allows local users to execute arbitrary code via unspecified vectors.
CWE
  • CWE-306 - Missing Authentication for Critical Function
Assigner
References
Impacted products
Vendor Product Version
Synology BeeDrive for desktop Affected: * , < 1.4.2-13960 (semver)
Create a notification for this product.
Credits
Zhao Runzi (赵润梓) 李建申(https://lsr00ter.github.io)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-54158",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-04T19:13:48.441045Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-04T20:01:18.860Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "BeeDrive for desktop",
          "vendor": "Synology",
          "versions": [
            {
              "lessThan": "1.4.2-13960",
              "status": "affected",
              "version": "*",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Zhao Runzi (\u8d75\u6da6\u6893)"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "\u674e\u5efa\u7533\uff08https://lsr00ter.github.io\uff09"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Missing authentication for critical function vulnerability in BeeDrive in Synology BeeDrive for desktop before 1.4.2-13960 allows local users to execute arbitrary code via unspecified vectors."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-04T15:13:29.761Z",
        "orgId": "db201096-a0cc-46c7-9a55-61d9e221bf01",
        "shortName": "synology"
      },
      "references": [
        {
          "name": "Synology-SA-25:08 BeeDrive for desktop",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_25_08"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "db201096-a0cc-46c7-9a55-61d9e221bf01",
    "assignerShortName": "synology",
    "cveId": "CVE-2025-54158",
    "datePublished": "2025-12-04T15:13:29.761Z",
    "dateReserved": "2025-07-17T07:37:50.117Z",
    "dateUpdated": "2025-12-04T20:01:18.860Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CERTFR-2025-AVI-0703

Vulnerability from certfr_avis - Published: 2025-08-18 - Updated: 2025-08-18

Une vulnérabilité a été découverte dans Synology BeeDrive. Elle permet à un attaquant de provoquer une atteinte à l'intégrité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Synology BeeDrive BeeDrive versions antérieures à 1.4.3-13973 pour desktop
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "BeeDrive versions ant\u00e9rieures \u00e0 1.4.3-13973 pour desktop",
      "product": {
        "name": "BeeDrive",
        "vendor": {
          "name": "Synology",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-8074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8074"
    }
  ],
  "initial_release_date": "2025-08-18T00:00:00",
  "last_revision_date": "2025-08-18T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0703",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-08-18T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Synology BeeDrive. Elle permet \u00e0 un attaquant de provoquer une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
  "title": "Vuln\u00e9rabilit\u00e9 dans Synology BeeDrive",
  "vendor_advisories": [
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Synology Synology_SA_25_09",
      "url": "https://www.synology.com/fr-fr/security/advisory/Synology_SA_25_09"
    }
  ]
}

CERTFR-2025-AVI-0628

Vulnerability from certfr_avis - Published: 2025-07-28 - Updated: 2025-07-28

De multiples vulnérabilités ont été découvertes dans Synology BeeDrive. Elles permettent à un attaquant de provoquer une exécution de code arbitraire et une atteinte à l'intégrité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Synology BeeDrive BeeDrive versions antérieures à 1.4.2-13960 pour desktop
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "BeeDrive versions ant\u00e9rieures \u00e0 1.4.2-13960 pour desktop",
      "product": {
        "name": "BeeDrive",
        "vendor": {
          "name": "Synology",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-54158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-54158"
    },
    {
      "name": "CVE-2025-54160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-54160"
    },
    {
      "name": "CVE-2025-54159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-54159"
    }
  ],
  "initial_release_date": "2025-07-28T00:00:00",
  "last_revision_date": "2025-07-28T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0628",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-07-28T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Synology BeeDrive. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Synology BeeDrive",
  "vendor_advisories": [
    {
      "published_at": "2025-07-22",
      "title": "Bulletin de s\u00e9curit\u00e9 Synology Synology_SA_25_08",
      "url": "https://www.synology.com/fr-fr/security/advisory/Synology_SA_25_08"
    }
  ]
}

CERTFR-2024-AVI-1026

Vulnerability from certfr_avis - Published: 2024-11-28 - Updated: 2025-12-08

De multiples vulnérabilités ont été découvertes dans les produits Synology. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

L'éditeur indique que les mises à jour pour DSM 7.2.1, DSM 7.1 et DSMUC 3.1, corrigeant les vulnérabilités rendues publiques au PWN2OWN 2024, seront disponibles d'ici trente jours.

Impacted products
Vendor Product Description
Synology BeeStation OS BeeFiles pour BeeStation OS versions 1.1.x antérieures à 1.1.0-10555
Synology DSM Surveillance Station pour DSM 6.2 versions antérieures à 9.2.2-9575
Synology BeeDrive BeeDrive for desktop versions antérieures à 1.3.2-13814
Synology DSM Surveillance Station pour DSM 7.1 versions antérieures à 9.2.2-11575
Synology DSM DSM versions 7.2.1.x antérieures à 7.2.1-69057-6
Synology DSM DSM versions 7.1 antérieures à 7.1.1-42962-7
Synology BeeStation OS BeeFiles pour BeeStation OS versions 1.0.x antérieures à 1.0.2-10429
Synology DSM Surveillance Station pour DSM 7.2 versions antérieures à 9.2.2-11575
Synology DSM DSMUC versions 3.1.x antérieures à 3.1.4-23079
Synology DSM DSM versions 7.2.2.x antérieures à 7.2.2-72806-1
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "BeeFiles pour BeeStation OS versions 1.1.x ant\u00e9rieures \u00e0 1.1.0-10555",
      "product": {
        "name": "BeeStation OS",
        "vendor": {
          "name": "Synology",
          "scada": false
        }
      }
    },
    {
      "description": "Surveillance Station pour DSM 6.2 versions ant\u00e9rieures \u00e0 9.2.2-9575",
      "product": {
        "name": "DSM",
        "vendor": {
          "name": "Synology",
          "scada": false
        }
      }
    },
    {
      "description": "BeeDrive for desktop versions ant\u00e9rieures \u00e0 1.3.2-13814",
      "product": {
        "name": "BeeDrive",
        "vendor": {
          "name": "Synology",
          "scada": false
        }
      }
    },
    {
      "description": "Surveillance Station pour DSM 7.1 versions ant\u00e9rieures \u00e0 9.2.2-11575",
      "product": {
        "name": "DSM",
        "vendor": {
          "name": "Synology",
          "scada": false
        }
      }
    },
    {
      "description": "DSM versions 7.2.1.x ant\u00e9rieures \u00e0 7.2.1-69057-6",
      "product": {
        "name": "DSM",
        "vendor": {
          "name": "Synology",
          "scada": false
        }
      }
    },
    {
      "description": "DSM versions 7.1 ant\u00e9rieures \u00e0 7.1.1-42962-7",
      "product": {
        "name": "DSM",
        "vendor": {
          "name": "Synology",
          "scada": false
        }
      }
    },
    {
      "description": "BeeFiles pour BeeStation OS versions 1.0.x ant\u00e9rieures \u00e0 1.0.2-10429",
      "product": {
        "name": "BeeStation OS",
        "vendor": {
          "name": "Synology",
          "scada": false
        }
      }
    },
    {
      "description": "Surveillance Station pour DSM 7.2 versions ant\u00e9rieures \u00e0 9.2.2-11575",
      "product": {
        "name": "DSM",
        "vendor": {
          "name": "Synology",
          "scada": false
        }
      }
    },
    {
      "description": "DSMUC versions 3.1.x ant\u00e9rieures \u00e0 3.1.4-23079",
      "product": {
        "name": "DSM",
        "vendor": {
          "name": "Synology",
          "scada": false
        }
      }
    },
    {
      "description": "DSM versions 7.2.2.x ant\u00e9rieures \u00e0 7.2.2-72806-1",
      "product": {
        "name": "DSM",
        "vendor": {
          "name": "Synology",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "L\u0027\u00e9diteur indique que les mises \u00e0 jour pour DSM 7.2.1, DSM 7.1 et DSMUC 3.1, corrigeant les vuln\u00e9rabilit\u00e9s rendues publiques au PWN2OWN 2024, seront disponibles d\u0027ici trente jours.",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-45538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45538"
    },
    {
      "name": "CVE-2024-5401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5401"
    },
    {
      "name": "CVE-2024-45539",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45539"
    }
  ],
  "initial_release_date": "2024-11-28T00:00:00",
  "last_revision_date": "2025-12-08T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-1026",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-11-28T00:00:00.000000"
    },
    {
      "description": "Ajout d\u0027identifiants de vuln\u00e9rabilit\u00e9s",
      "revision_date": "2025-12-08T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Synology. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Synology",
  "vendor_advisories": [
    {
      "published_at": "2024-11-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Synology Synology_SA_24_25",
      "url": "https://www.synology.com/fr-fr/security/advisory/Synology_SA_24_25"
    },
    {
      "published_at": "2024-11-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Synology Synology_SA_24_20",
      "url": "https://www.synology.com/fr-fr/security/advisory/Synology_SA_24_20"
    },
    {
      "published_at": "2024-11-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Synology Synology_SA_24_15",
      "url": "https://www.synology.com/fr-fr/security/advisory/Synology_SA_24_15"
    },
    {
      "published_at": "2024-11-27",
      "title": "Bulletin de s\u00e9curit\u00e9 Synology Synology_SA_24_27",
      "url": "https://www.synology.com/fr-fr/security/advisory/Synology_SA_24_27"
    },
    {
      "published_at": "2024-11-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Synology Synology_SA_24_26",
      "url": "https://www.synology.com/fr-fr/security/advisory/Synology_SA_24_26"
    }
  ]
}