Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 13 Apr 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Local HTTP Server Exposes Sensitive Files in Synology SSL VPN Client |
Mon, 13 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Synology
Synology ssl Vpn Client |
|
| Vendors & Products |
Synology
Synology ssl Vpn Client |
Fri, 10 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A files or directories accessible to external parties vulnerability in Synology SSL VPN Client before 1.4.5-0684 allows remote attackers to access files within the installation directory via a local HTTP server bound to the loopback interface. By leveraging user interaction with a crafted web page, attackers may retrieve sensitive files such as configuration files, certificates, and logs, leading to information disclosure. | |
| Weaknesses | CWE-552 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: synology
Published:
Updated: 2026-04-10T12:43:33.313Z
Reserved: 2026-04-10T06:29:38.695Z
Link: CVE-2021-47960
Updated: 2026-04-10T12:43:30.504Z
Status : Awaiting Analysis
Published: 2026-04-10T10:16:02.853
Modified: 2026-04-13T15:02:06.187
Link: CVE-2021-47960
No data.
OpenCVE Enrichment
Updated: 2026-04-13T13:06:12Z