CVE-2026-3091
Uncontrolled Search Path Vulnerability in Synology Presto Client Allows Arbitrary File Access
Publication date: 2026-02-24
Last updated on: 2026-03-04
Assigner: Synology Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| synology | presto_client | to 2.1.3-0672 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-427 | The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-3091 is an uncontrolled search path element vulnerability in Synology Presto Client versions before 2.1.3-0672. It allows local users to read or write arbitrary files during the installation process by placing a malicious DLL file in the same directory as the installer.
How can this vulnerability impact me? :
This vulnerability can have a high impact on the confidentiality, integrity, and availability of your system. Because an attacker with local access can place a malicious DLL to be loaded during installation, they can potentially read or modify arbitrary files, leading to unauthorized data access or system compromise.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves placing a malicious DLL in the same directory as the Synology Presto Client installer before installation. Detection would involve checking for unexpected or suspicious DLL files in the installer directory.
Since the vulnerability is local and requires user interaction during installation, network detection is unlikely to be effective.
No specific detection commands or tools are provided in the available information.
What immediate steps should I take to mitigate this vulnerability?
The only mitigation provided is to upgrade the Synology Presto Client to version 2.1.3-0672 or later.
No other mitigations or workarounds are mentioned.