CVE-2026-24935
📋 TL;DR
This vulnerability allows a Man-in-the-Middle attacker to intercept or redirect NAT tunnel establishment due to improper SSL/TLS certificate validation in a third-party NAT traversal module. While subsequent device access requires authentication, attackers can disrupt service availability or act as proxies for targeted attacks. Affected systems include ASUSTOR ADM versions 4.1.0 through 4.3.3.ROF1 and 5.0.0 through 5.1.1.RCI1.
💻 Affected Systems
- ASUSTOR ADM
⚠️ Risk & Real-World Impact
Worst Case
Attacker establishes persistent MitM position, intercepting all NAT tunnel traffic, disrupting service availability, and potentially facilitating credential theft or further attacks against device services.
Likely Case
Service disruption through NAT tunnel interception or redirection, potentially causing connectivity issues for affected devices.
If Mitigated
Limited to temporary service disruption during NAT tunnel establishment, with subsequent authentication preventing deeper system compromise.
🎯 Exploit Status
Exploitation requires MitM position on network path between device and signaling server during NAT tunnel establishment.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: ADM 4.3.4.RCU1 and ADM 5.1.2.RCJ1
Vendor Advisory: https://www.asustor.com/security/security_advisory_detail?id=50
Restart Required: Yes
Instructions:
1. Log into ADM web interface. 2. Navigate to Settings > ADM Update. 3. Check for updates and install ADM 4.3.4.RCU1 or ADM 5.1.2.RCJ1. 4. Restart the system when prompted.
🔧 Temporary Workarounds
Disable NAT Traversal
allTemporarily disable the vulnerable NAT traversal module to prevent exploitation.
Navigate to Settings > Network > NAT Traversal and disable all NAT traversal options
Network Segmentation
allIsolate affected devices from untrusted networks to limit MitM opportunities.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate affected devices
- Monitor for unusual NAT tunnel establishment patterns or connection failures
🔍 How to Verify
Check if Vulnerable:
Check ADM version in Settings > ADM Update. If version is between 4.1.0-4.3.3.ROF1 or 5.0.0-5.1.1.RCI1, system is vulnerable.
Check Version:
ssh admin@[nas-ip] 'cat /etc/nas.conf | grep version'
Verify Fix Applied:
Verify ADM version is 4.3.4.RCU1 or higher for 4.x branch, or 5.1.2.RCJ1 or higher for 5.x branch.
📡 Detection & Monitoring
Log Indicators:
- Failed NAT tunnel connections
- Unexpected SSL/TLS certificate warnings in system logs
- Multiple connection attempts to signaling servers
Network Indicators:
- Unusual traffic patterns during NAT tunnel establishment
- SSL/TLS handshake anomalies to signaling servers
SIEM Query:
source="asustor_logs" AND (event="nat_tunnel_failed" OR event="ssl_certificate_error")