CVE-2026-3091
Received Received - Intake
Uncontrolled Search Path Vulnerability in Synology Presto Client Allows Arbitrary File Access

Publication date: 2026-02-24

Last updated on: 2026-03-04

Assigner: Synology Inc.

Description
An uncontrolled search path element vulnerability in Synology Presto Client before 2.1.3-0672 allows local users to read or write arbitrary files during installation by placing a malicious DLL in advance in the same directory as the installer.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-24
Last Modified
2026-03-04
Generated
2026-05-07
AI Q&A
2026-02-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
synology presto_client to 2.1.3-0672 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-427 The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-3091 is an uncontrolled search path element vulnerability in Synology Presto Client versions before 2.1.3-0672. It allows local users to read or write arbitrary files during the installation process by placing a malicious DLL file in the same directory as the installer.


How can this vulnerability impact me? :

This vulnerability can have a high impact on the confidentiality, integrity, and availability of your system. Because an attacker with local access can place a malicious DLL to be loaded during installation, they can potentially read or modify arbitrary files, leading to unauthorized data access or system compromise.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves placing a malicious DLL in the same directory as the Synology Presto Client installer before installation. Detection would involve checking for unexpected or suspicious DLL files in the installer directory.

Since the vulnerability is local and requires user interaction during installation, network detection is unlikely to be effective.

No specific detection commands or tools are provided in the available information.


What immediate steps should I take to mitigate this vulnerability?

The only mitigation provided is to upgrade the Synology Presto Client to version 2.1.3-0672 or later.

No other mitigations or workarounds are mentioned.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart