The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-24933

CVE-2026-24933: ADM Certificate Validation Vulnerability

CVE-2026-24933 is an improper certificate validation flaw in ADM that enables Man-in-the-Middle attacks to intercept sensitive data. This article covers the technical details, affected versions, impact, and mitigation.

Published: February 6, 2026

CVE-2026-24933 Overview

CVE-2026-24933 is an improper certificate validation vulnerability affecting Asustor ADM (ASUSTOR Data Master) NAS operating system. The API communication component fails to validate SSL/TLS certificates when sending HTTPS requests to the server, enabling unauthenticated remote attackers to perform Man-in-the-Middle (MitM) attacks and intercept cleartext communications. This vulnerability can lead to the exposure of sensitive user information, including account emails, MD5 hashed passwords, and device serial numbers.

Critical Impact

Unauthenticated attackers positioned in the network path can intercept sensitive credentials and device information through MitM attacks, potentially leading to full account compromise and unauthorized NAS access.

Affected Products

  • Asustor ADM 4.1.0 through ADM 4.3.3.ROF1
  • Asustor ADM 5.0.0 through ADM 5.1.1.RCI1
  • Asustor NAS devices running affected ADM versions

Discovery Timeline

  • 2026-02-03 - CVE-2026-24933 published to NVD
  • 2026-02-03 - Last updated in NVD database

Technical Details for CVE-2026-24933

Vulnerability Analysis

This vulnerability stems from CWE-295: Improper Certificate Validation in the Asustor ADM API communication component. When the ADM system initiates HTTPS connections to external servers, it fails to properly verify the authenticity of the server's SSL/TLS certificate. This oversight allows an attacker who can intercept network traffic between the ADM device and its intended server to present a fraudulent certificate without detection.

The lack of certificate validation creates a significant security gap in what should be encrypted communications. Even though HTTPS is being used, the absence of certificate verification means the encryption provides no protection against active network attackers. The attacker can decrypt, inspect, and potentially modify traffic passing through their position.

The exposure of MD5 hashed passwords is particularly concerning given that MD5 is cryptographically weak and vulnerable to rainbow table attacks and collision exploits. Combined with the leaked email addresses and device serial numbers, attackers gain multiple vectors for further compromise.

Root Cause

The root cause is improper implementation of SSL/TLS certificate validation in the API communication layer. The application accepts any certificate presented during the TLS handshake without verifying that it was issued by a trusted Certificate Authority, checking for certificate revocation, or validating that the certificate's Common Name (CN) or Subject Alternative Name (SAN) matches the expected server hostname. This is a common implementation error when developers disable certificate verification during testing and fail to re-enable it for production.

Attack Vector

The attack requires an adversary to position themselves in the network path between the vulnerable ADM device and the server it communicates with. This can be achieved through ARP spoofing on local networks, DNS hijacking, BGP hijacking for internet traffic, or compromising network infrastructure such as routers or switches.

Once positioned, the attacker performs the following attack sequence:

  1. The attacker intercepts the initial TLS handshake from the ADM device
  2. The attacker presents their own certificate to the ADM device (which accepts it without validation)
  3. The attacker establishes a separate TLS connection to the legitimate server
  4. All traffic flows through the attacker, who can read and modify the cleartext data
  5. Sensitive information including account emails, MD5 password hashes, and device serial numbers are captured

For technical details on the vulnerability mechanism and exploitation scenarios, refer to the Asustor Security Advisory #50.

Detection Methods for CVE-2026-24933

Indicators of Compromise

  • Unexpected certificate warnings or errors in ADM logs when communicating with Asustor services
  • Network traffic analysis showing TLS connections with untrusted or self-signed certificates
  • Evidence of ARP spoofing or DNS manipulation on networks where ADM devices operate
  • Unauthorized login attempts using credentials that could only be obtained through interception

Detection Strategies

  • Deploy network intrusion detection systems (NIDS) to monitor for ARP spoofing attempts on segments containing NAS devices
  • Implement certificate transparency monitoring to detect rogue certificates impersonating Asustor domains
  • Monitor for unusual authentication patterns that may indicate credential theft via MitM attacks
  • Use SentinelOne Singularity to detect suspicious network behavior and potential credential harvesting activities

Monitoring Recommendations

  • Enable verbose logging on ADM systems to capture SSL/TLS connection details and certificate information
  • Implement network segmentation to isolate NAS devices and limit MitM attack opportunities
  • Deploy certificate pinning validation at the network perimeter where possible
  • Monitor for password reset requests and account compromise indicators following potential exposure windows

How to Mitigate CVE-2026-24933

Immediate Actions Required

  • Update Asustor ADM to a patched version as soon as one becomes available from the vendor
  • Implement network segmentation to isolate NAS devices from untrusted network segments
  • Enable additional authentication factors where supported to mitigate credential exposure risks
  • Monitor for unauthorized access attempts using potentially compromised credentials
  • Consider changing user passwords as a precautionary measure, especially for administrative accounts

Patch Information

Asustor has released security information regarding this vulnerability. System administrators should consult the Asustor Security Advisory #50 for specific patch versions and upgrade instructions. Update ADM to the latest available version that addresses CVE-2026-24933.

Workarounds

  • Place ADM devices on isolated network segments with strict egress filtering to limit exposure to MitM attacks
  • Implement VPN tunneling for all ADM external communications to add an additional layer of encryption
  • Use network monitoring tools to detect and alert on potential ARP spoofing or DNS manipulation attacks
  • Disable unnecessary external API communications until patches are applied
bash
# Network isolation example - iptables rules to restrict ADM outbound connections
# Apply on firewall/router protecting NAS segment

# Allow only essential outbound connections through VPN tunnel
iptables -A FORWARD -s 192.168.1.0/24 -o tun0 -j ACCEPT
iptables -A FORWARD -s 192.168.1.0/24 -j DROP

# Log potential MitM attempts
iptables -A INPUT -p tcp --dport 443 -j LOG --log-prefix "HTTPS_INTERCEPT: "

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechAdm

  • SeverityHIGH

  • CVSS Score8.9

  • EPSS Probability0.04%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-295
  • Technical References
  • Asustor Security Advisory #50
  • Related CVEs
  • CVE-2026-24932: ADM DDNS Information Disclosure Flaw

  • CVE-2026-24934: ADM DDNS Information Disclosure Flaw

  • CVE-2026-24936: ADM Active Directory RCE Vulnerability

  • CVE-2026-24935: ADM NAT Traversal DoS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English