Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24935: CWE-295 Improper Certificate Validation in ASUSTOR ADM

0
Medium
VulnerabilityCVE-2026-24935cvecve-2026-24935cwe-295
Published: Tue Feb 03 2026 (02/03/2026, 02:28:56 UTC)
Source: CVE Database V5
Vendor/Project: ASUSTOR
Product: ADM

Description

CVE-2026-24935 is a medium severity vulnerability in ASUSTOR ADM affecting versions 4. 1. 0 through 4. 3. 3. ROF1 and 5. 0. 0 through 5. 1. 1.

AI-Powered Analysis

AILast updated: 02/03/2026, 08:03:37 UTC

Technical Analysis

CVE-2026-24935 is a vulnerability classified under CWE-295 (Improper Certificate Validation) found in ASUSTOR ADM, a network-attached storage operating system. The issue stems from a third-party NAT traversal module that fails to properly validate SSL/TLS certificates when connecting to the signaling server responsible for establishing NAT tunnels. This improper validation allows an attacker positioned as a Man-in-the-Middle (MitM) to intercept or redirect the NAT tunnel setup process. While subsequent access to device services requires additional authentication, the attacker can disrupt service availability by interfering with tunnel establishment or act as a proxy to relay or manipulate traffic between the user and device services. This could facilitate further targeted attacks, such as credential harvesting or exploitation of other vulnerabilities. The affected versions span ADM 4.1.0 through 4.3.3.ROF1 and 5.0.0 through 5.1.1.RCI1. The CVSS v4.0 base score is 6.3, indicating medium severity, with network attack vector, low complexity, no privileges required, no user interaction, and partial impacts on confidentiality, integrity, and availability. No patches or exploits are currently publicly available, but the vulnerability poses a risk especially in environments where NAT traversal is critical for remote access.

Potential Impact

For European organizations, this vulnerability could lead to service disruptions or enable attackers to position themselves as intermediaries in communications with ASUSTOR ADM devices. This may compromise confidentiality and integrity of data transmitted through the NAT tunnels, potentially exposing sensitive information or enabling further exploitation. Organizations relying on ASUSTOR ADM for critical storage or remote access services could face operational downtime or data leakage risks. The threat is heightened in sectors with stringent data protection requirements such as finance, healthcare, and government. Additionally, the ability to disrupt availability could impact business continuity. Since the vulnerability does not require authentication or user interaction, it can be exploited remotely, increasing the attack surface for exposed devices connected to the internet or untrusted networks.

Mitigation Recommendations

Organizations should monitor ASUSTOR's official channels for patches addressing this vulnerability and apply them promptly once released. In the interim, network-level mitigations include restricting access to ADM devices and their NAT traversal signaling servers via firewall rules or VPNs to trusted IP ranges only. Employing network segmentation to isolate ADM devices from general user networks can reduce exposure. Enabling and enforcing multi-factor authentication on ADM services adds an additional security layer beyond the vulnerable NAT traversal module. Regularly auditing network traffic for unusual patterns indicative of MitM attacks or tunnel disruptions can aid early detection. Where possible, disabling or replacing the affected NAT traversal functionality with more secure alternatives should be considered. Finally, educating administrators about this specific risk and encouraging vigilance around ADM device configurations will help reduce exploitation likelihood.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ASUSTOR1
Date Reserved
2026-01-28T08:40:24.462Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6981ab4df9fa50a62fae40e5

Added to database: 2/3/2026, 8:01:17 AM

Last enriched: 2/3/2026, 8:03:37 AM

Last updated: 2/3/2026, 9:04:12 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats