Synology Vulnerability Response Policy
Introduction
Find your information
- Synology publishes a wide range of supporting documentation.
- In Knowledge Center, you will find useful Help and FAQ articles, as well as video tutorials breaking up processes into handy steps. You can also find User's Guides, Solution Guides, brochures, and White Papers. Experienced users and administrators will find answers and guidance in technical Administrator's Guides and Developer Guides.
- Got a problem and unable to find the solution in our official documentation? Search hundreds of answers by users and support staff in Synology Community or reach Synology Support through the web form, email or telephone.
As a NAS vendor, Synology provides a variety of devices, such as private cloud devices, router devices, and surveillance solutions. Synology understands the security risks on out-of-date devices and the importance of security fixes.
This white paper outlines Synology's approach to security and policy compliance for DiskStation Manager (DSM), Synology Router Manager (SRM), Synology Surveillance products, BeeStation, Synology-developed packages including mobile applications and desktop utilities, Synology-distributed open source packages, and partner packages. From personal to enterprise, Synology offers various services for you to make your own private cloud up and running. This paper illustrates Synology's security policy, how Synology identifies security threats with proper ratings, and Synology's incident response flow against vulnerabilities, such as reporting Common Vulnerabilities and Exposures (CVE) day-by-day.
Synology reserves the final right to change any content in this document at any time without prior notice. In the event of any changes, the revised document will be available on kb.synology.com. Please check the latest information indicated herein to inform yourself of any changes.