Synology has put out an important security update to fix a serious flaw in its DiskStation Manager (DSM) software This article explores synology important security. . The flaw could let remote attackers who don't have permission run any command on the affected NAS devices.

This vulnerability is especially dangerous because NAS systems often hold important business data, backups, and private files. If attackers are successful, they could: Use ransomware to attack backups that are stored. Take sensitive information out of shared storage. Make sure that persistence is present in the network.

Use the hacked NAS as a place to move sideways. Synology said that many versions of DSM are not safe. The following versions need to be updated right away: 7.3.3, 7.2.2-86009-3, and 7.1.1-69057-11 or later. Patch for DSMUC 3.1 is still being worked on.

The vulnerability shows that legacy protocols and old service components in modern infrastructure are still dangerous. Even popular business software can be at risk if older network services are still running. Organizations should regularly check their exposed services, turn off protocols that aren't needed, and make sure that patch management is done on time.

To protect against remote attacks that are getting more and more sophisticated and target storage infrastructure, proactive hardening and constant monitoring are still very important. Because Telnet doesn't encrypt data, it shouldn't be used in modern settings. For remote access, SSH and other secure options are highly recommended. Turning off Telnet completely removes the vulnerable attack surface.

It is best to temporarily fix the problem by turning off the Telnet service.

To turn off Telnet, sign in to the Synology NAS interface. Open the Control Panel Go to the settings for Terminal Uncheck the box next to "Enable Telnet Service" and then click "Apply."