{"vulnerability": "CVE-2024-10445", "sightings": [{"uuid": "8c9f64c9-223d-48fb-a8ea-d0d1d8e3ea87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10445", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-210/", "content": "", "creation_timestamp": "2025-04-09T03:00:00.000000Z"}, {"uuid": "9a41a828-dce2-46e1-9a18-d5ae0e287e7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10445", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-209/", "content": "", "creation_timestamp": "2025-04-09T03:00:00.000000Z"}, {"uuid": "ea8fd866-7d2d-436c-a596-b0ebd9d02c7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10445", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:28.000000Z"}, {"uuid": "efd09d9b-2225-4ab8-a3db-67e02e3be177", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10445", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-269/", "content": "", "creation_timestamp": "2025-05-01T03:00:00.000000Z"}, {"uuid": "f9dfbb5b-e6b9-4f75-b68e-33d12822bab1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10445", "type": "seen", "source": "https://t.me/cvedetector/20613", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10445 - Synology BeeStation Manager, DiskStation Manager, and Unified Controller Certificate Validation Remote File Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10445 \nPublished : March 19, 2025, 2:15 a.m. | 33\u00a0minutes ago \nDescription : Improper certificate validation vulnerability in the update functionality in Synology BeeStation Manager (BSM) before 1.1-65374, Synology DiskStation Manager (DSM) before 6.2.4-25556-8, 7.1.1-42962-7, 7.2-64570-4, 7.2.1-69057-6 and 7.2.2-72806-1 and Synology Unified Controller (DSMUC) before 3.1.4-23079 allows remote attackers to write limited files via unspecified vectors. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-19T04:36:55.000000Z"}, {"uuid": "56adbcf0-48d8-4a5e-adb2-108ee14f33cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10445", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9036", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10445\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Improper certificate validation vulnerability in the update functionality in Synology BeeStation OS (BSM) before 1.1-65374 and Synology DiskStation Manager (DSM) before 6.2.4-25556-8, 7.1.1-42962-7, 7.2-64570-4, 7.2.1-69057-6 and 7.2.2-72806-1 allow remote attackers to write limited files via unspecified vectors.\n\ud83d\udccf Published: 2025-03-19T02:10:57.215Z\n\ud83d\udccf Modified: 2025-03-27T09:05:57.248Z\n\ud83d\udd17 References:\n1. https://www.synology.com/en-global/security/advisory/Synology_SA_24_20\n2. https://www.synology.com/en-global/security/advisory/Synology_SA_24_23", "creation_timestamp": "2025-03-27T09:26:58.000000Z"}, {"uuid": "e70d8a5a-0a94-4d63-8be1-037eb9d01061", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10445", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:28.000000Z"}, {"uuid": "4d81574c-f289-48e9-b6ac-1df4ee354ab7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10445", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8011", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10445\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Improper certificate validation vulnerability in the update functionality in Synology BeeStation Manager (BSM) before 1.1-65374, Synology DiskStation Manager (DSM) before 6.2.4-25556-8, 7.1.1-42962-7, 7.2-64570-4, 7.2.1-69057-6 and 7.2.2-72806-1 and Synology Unified Controller (DSMUC) before 3.1.4-23079 allows remote attackers to write limited files via unspecified vectors.\n\ud83d\udccf Published: 2025-03-19T02:10:57.215Z\n\ud83d\udccf Modified: 2025-03-19T02:10:57.215Z\n\ud83d\udd17 References:\n1. https://www.synology.com/en-global/security/advisory/Synology_SA_24_20\n2. https://www.synology.com/en-global/security/advisory/Synology_SA_24_23", "creation_timestamp": "2025-03-19T02:49:22.000000Z"}]}