A plaintext storage of a password vulnerability in Synology SSL VPN Client before 1.4.5-0684 allows remote attackers to access or influence the user's PIN code due to insecure storage. This may lead to unauthorized VPN configuration and potential interception of subsequent VPN traffic when combined with user interaction.
History

Fri, 10 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
Description A plaintext storage of a password vulnerability in Synology SSL VPN Client before 1.4.5-0684 allows remote attackers to access or influence the user's PIN code due to insecure storage. This may lead to unauthorized VPN configuration and potential interception of subsequent VPN traffic when combined with user interaction.
Weaknesses CWE-256
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: synology

Published: 2026-04-10T09:22:37.522Z

Updated: 2026-04-10T12:42:56.656Z

Reserved: 2026-04-10T06:29:38.695Z

Link: CVE-2021-47961

cve-icon Vulnrichment

Updated: 2026-04-10T12:42:53.753Z

cve-icon NVD

Status : Received

Published: 2026-04-10T10:16:03.913

Modified: 2026-04-10T10:16:03.913

Link: CVE-2021-47961

cve-icon Redhat

No data.