Home

Description

A third-party NAT traversal module fails to validate SSL/TLS certificates when connecting to the signaling server. While subsequent access to device services requires additional authentication, a Man-in-the-Middle (MitM) attacker can intercept or redirect the NAT tunnel establishment. This could allow an attacker to disrupt service availability or facilitate further targeted attacks by acting as a proxy between the user and the device services. Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.ROF1 as well as from ADM 5.0.0 through ADM 5.1.1.RCI1.

PUBLISHED Reserved 2026-01-28 | Published 2026-02-03 | Updated 2026-02-03 | Assigner ASUSTOR1




MEDIUM: 6.3CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-295 Improper Certificate Validation

Product status

Default status
unaffected

4.1.0 (custom)
affected

5.0.0 (custom)
affected

Credits

Nuke reporter

References

www.asustor.com/security/security_advisory_detail?id=50 vendor-advisory

cve.org (CVE-2026-24935)

nvd.nist.gov (CVE-2026-24935)

Download JSON