Initiatives pour
En tant qu'autorité nationale en matière de cybersécurité, le CCB a développé plusieurs initiatives destinées à des publics spécifiques, qui sont présentées ici.
- Last update: 03/02/2026
- Affected software: ASUSTOR Data Master (ADM) versions: 5.0, 4.3, 4.2, 4.1
- Type: CWE-20 - Improper Input Validation
- CVE/CVSS
→ CVE-2026-24936: CVSS 9.5 (CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H)
ASUSTOR - <https://www.asustor.com/security/security_advisory_detail?id=51 >
ASUSTOR Data Master (ADM) is the operating system for ASUSTOR NAS devices, providing a web-based interface to manage storage, users, backups, and apps.
This vulnerability in ADM allows unauthenticated attackers to write arbitrary files when a specific function is enabled while joining an AD Domain from ADM.
The impact to confidentiality, integrity, and availability is high.
It’s especially dangerous because NAS devices often store sensitive data, credentials, and configuration files; exploitation could lead to immediate data loss or lateral movement in enterprise networks.
There is currently no evidence that this vulnerability has been exploited in the wild, but NAS devices have been targeted in multiple campaigns in the past.
This weakness allows attackers to conduct the following:
Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority after thorough testing.
For affected products:
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity and ensure a swift response in case of an intrusion.
In case of an intrusion, you can report an incident via https://ccb.belgium.be/en/cert/report-incident.
While patching appliances or software to the newest version may protect against future exploitation, it does not remediate historic compromise.