Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3100: CWE-295 Improper Certificate Validation in ASUSTOR ADM

0
High
VulnerabilityCVE-2026-3100cvecve-2026-3100cwe-295
Published: Wed Feb 25 2026 (02/25/2026, 05:52:20 UTC)
Source: CVE Database V5
Vendor/Project: ASUSTOR
Product: ADM

Description

The FTP Backup on the ADM will not properly strictly enforce TLS certificate verification while connecting to an FTP server using FTPES/FTPS. An improper validated TLS/SSL certificates allows a remote attacker can intercept network traffic to perform a Man-in-the-Middle (MitM) attack, which may intercept, modify, or obtain sensitive information such as authentication credentials and backup data. Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.ROF1 as well as from ADM 5.0.0 through ADM 5.1.2.RE51.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 19:00:10 UTC

Technical Analysis

CVE-2026-3100 is a vulnerability classified under CWE-295 (Improper Certificate Validation) found in ASUSTOR's ADM operating system, specifically impacting the FTP Backup feature when connecting to FTP servers using FTPES or FTPS protocols. The vulnerability arises because the ADM software does not strictly enforce TLS/SSL certificate verification, allowing an attacker positioned on the network path to intercept and manipulate the encrypted communication. This improper validation undermines the security guarantees of TLS, enabling Man-in-the-Middle (MitM) attacks where attackers can capture sensitive information such as authentication credentials and backup data, or alter the data in transit. The affected ADM versions range from 4.1.0 to 4.3.3.ROF1 and 5.0.0 to 5.1.2.RE51, covering multiple major releases. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS v4.0 score of 8.3 reflects high severity, with network attack vector, low attack complexity, and no privileges or user interaction needed. While no public exploits have been reported yet, the vulnerability's nature and impact make it a critical concern for organizations relying on ASUSTOR ADM for secure backup operations over FTPES/FTPS.

Potential Impact

The primary impact of CVE-2026-3100 is the potential compromise of confidentiality and integrity of backup data and authentication credentials transmitted during FTP Backup operations. Successful exploitation allows attackers to intercept and potentially modify backup data, which can lead to data breaches, data tampering, or disruption of backup integrity. This can have severe consequences for organizations relying on these backups for disaster recovery and data retention, potentially leading to data loss or ransomware scenarios if backups are corrupted or stolen. The vulnerability also exposes sensitive credentials, which could be leveraged for further network intrusion or lateral movement. Given the network-based nature and lack of required authentication, the attack surface is broad, affecting any organization using vulnerable ADM versions in environments where FTPES/FTPS backups are configured. This can impact sectors with critical data storage needs such as healthcare, finance, government, and enterprises globally.

Mitigation Recommendations

To mitigate CVE-2026-3100, organizations should immediately upgrade ASUSTOR ADM to versions beyond 4.3.3.ROF1 and 5.1.2.RE51 once patches are released by the vendor. Until patches are available, administrators should consider disabling FTP Backup over FTPES/FTPS or switch to alternative secure backup methods that enforce strict certificate validation, such as SFTP or VPN-protected transfers. Network segmentation and monitoring should be enhanced to detect unusual traffic patterns indicative of MitM attacks. Implementing network-level protections like TLS interception detection, strict firewall rules limiting FTPES/FTPS connections to trusted servers, and using certificate pinning where possible can reduce risk. Regularly auditing backup configurations and verifying certificate validity manually can help identify misconfigurations. Additionally, organizations should enforce strong credential management and monitor for unauthorized access attempts to minimize the impact of credential compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ASUSTOR1
Date Reserved
2026-02-24T08:35:18.143Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699e999bb7ef31ef0be231a3

Added to database: 2/25/2026, 6:41:31 AM

Last enriched: 3/4/2026, 7:00:10 PM

Last updated: 4/11/2026, 10:52:26 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses