We use cookies to help us improve our webpage. Please read our Cookie Policy .

AS-2026-001: ADM

2026-02-03

Severity

Important

Status

Ongoing


Statement

Multiple improper certificates validation vulnerabilities have been reported to affect ADM:

  • When updating the DDNS settings in ADM
  • When sending HTTPS requests to the server
  • When querying an external server for the device's WAN IP address
  • In a third-party NAT traversal module

Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.ROF1 as well as from ADM 5.0.0 through ADM 5.1.1.RCI1.

  • The issues have been fixed on ADM 5.1.2.RE31.

Affected Products

Product Severity Fixed Release Availability
ADM 5.0 Important Upgrade to ADM 5.1.2.RE31 or above.
ADM 4.3, ADM 4.2 and 4.1 Important Ongoing

Detail

  • CVE-2026-24932
    • Severity: High
    • CVSS4 Base Score: 8.9
    • CVSS4 Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
    • The DDNS update process in ADM fails to properly validate the hostname of the DDNS server's TLS/SSL certificate. Although the connection uses HTTPS, an improper validated TLS/SSL certificates allows a remote attacker can intercept the communication to perform a Man-in-the-Middle (MitM) attack, which may obtain the sensitive information of DDNS updating process, including the user's account email, MD5 hashed password, and device serial number. Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.ROF1 as well as from ADM 5.0.0 through ADM 5.1.1.RCI1.
  • CVE-2026-24933
    • Severity: High
    • CVSS4 Base Score: 8.9
    • CVSS4 Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
    • The API communication component fails to validate the SSL/TLS certificate when sending HTTPS requests to the server. An improper certificates validation vulnerability allows an unauthenticated remote attacker can perform a Man-in-the-Middle (MitM) attack to intercept the cleartext communication, potentially leading to the exposure of sensitive user information, including account emails, MD5 hashed passwords, and device serial numbers. Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.ROF1 as well as from ADM 5.0.0 through ADM 5.1.1.RCI1.
  • CVE-2026-24934
    • Severity: Medium
    • CVSS4 Base Score: 6.3
    • CVSS4 Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N
    • The DDNS function uses an insecure HTTP connection or fails to validate the SSL/TLS certificate when querying an external server for the device's WAN IP address. An unauthenticated remote attacker can perform a Man-in-the-Middle (MitM) attack to spoof the response, leading the device to update its DDNS record with an incorrect IP address. Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.ROF1 as well as from ADM 5.0.0 through ADM 5.1.1.RCI1.
  • CVE-2026-24935
    • Severity: Medium
    • CVSS4 Base Score: 6.3
    • CVSS4 Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
    • A third-party NAT traversal module fails to validate SSL/TLS certificates when connecting to the signaling server. While subsequent access to device services requires additional authentication, a Man-in-the-Middle (MitM) attacker can intercept or redirect the NAT tunnel establishment. This could allow an attacker to disrupt service availability or facilitate further targeted attacks by acting as a proxy between the user and the device services. Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.ROF1 as well as from ADM 5.0.0 through ADM 5.1.1.RCI1.

Reference

Acknowledgement

Nuke


Revision

Revision Date Description
1 2026-01-26 Initial public release.
2 2026-02-03 CVE ID (CVE-2026-24932, CVE-2026-24933, CVE-2026-24934, CVE-2026-24935) are assigned for the issues.
3 2026-02-03 ADM 5.1.2.RE31 has been released for fixing the issues.