{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2021-47960","assignerOrgId":"db201096-a0cc-46c7-9a55-61d9e221bf01","state":"PUBLISHED","assignerShortName":"synology","dateReserved":"2026-04-10T06:29:38.695Z","datePublished":"2026-04-10T09:21:54.559Z","dateUpdated":"2026-04-10T12:43:33.313Z"},"containers":{"cna":{"problemTypes":[{"descriptions":[{"lang":"en","description":"Files or Directories Accessible to External Parties","cweId":"CWE-552","type":"CWE"}]}],"affected":[{"vendor":"Synology","product":"Synology SSL VPN Client","versions":[{"version":"*","status":"affected","lessThan":"1.4.5-0684","versionType":"semver"}],"defaultStatus":"affected"}],"descriptions":[{"lang":"en","value":"A files or directories accessible to external parties vulnerability in Synology SSL VPN Client before 1.4.5-0684 allows remote attackers to access files within the installation directory via a local HTTP server bound to the loopback interface. By leveraging user interaction with a crafted web page, attackers may retrieve sensitive files such as configuration files, certificates, and logs, leading to information disclosure."}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"baseScore":6.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","version":"3.1"}}],"references":[{"url":"https://www.synology.com/en-global/security/advisory/Synology_SA_26_05","name":"Synology-SA-26:05 Synology SSL VPN Client","tags":["vendor-advisory"]}],"credits":[{"lang":"en","value":"Laurent Sibilla (https://www.linkedin.com/in/lsibilla/)","type":"finder"}],"providerMetadata":{"orgId":"db201096-a0cc-46c7-9a55-61d9e221bf01","shortName":"synology","dateUpdated":"2026-04-10T09:21:54.559Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-10T12:43:26.407315Z","id":"CVE-2021-47960","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-10T12:43:33.313Z"}}]}}