EUVD-2025-17331

| CVE-2025-33031 HIGH
2025-06-06 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 18:10 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 18:10 euvd
EUVD-2025-17331
CVE Published
Jun 06, 2025 - 16:15 nvd
HIGH 8.8

Description

An improper certificate validation vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to compromise the security of the system. We have already fixed the vulnerability in the following version: File Station 5 5.5.6.4847 and later

Analysis

CVE-2025-33031 is an improper certificate validation vulnerability in Synology File Station 5 that allows authenticated remote attackers to compromise system confidentiality, integrity, and availability. An attacker with valid user credentials can exploit insufficient SSL/TLS certificate validation to perform man-in-the-middle attacks or bypass security controls. The vulnerability has a high CVSS score of 8.8 and affects all versions of File Station 5 prior to 5.5.6.4847; patches are available from Synology.

Technical Context

This vulnerability stems from CWE-295 (Improper Certificate Validation), a root cause class where applications fail to properly validate X.509 certificates during SSL/TLS handshakes. In the context of File Station 5, the affected product likely uses certificate validation for secure communications with backend services, storage systems, or client connections. The improper validation mechanism may accept self-signed certificates, expired certificates, or certificates with mismatched hostnames, allowing attackers with network access to intercept encrypted communications. File Station 5 is Synology's web-based file management solution (CPE pattern: cpe:2.3:a:synology:file_station:*). The vulnerability requires prior authentication, indicating the certificate validation flaw exists within authenticated user session handling or inter-service communication chains.

Affected Products

File Station 5 (All versions prior to 5.5.6.4847)

Priority Score

44
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +44
POC: 0

Share

EUVD-2025-17331 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy