Get Support
Forums
Knowledge Base
Data Recovery
Security Notices
Downloads
Warranty Information
Find and download the latest product firmware, utility or driver.
Partner Program
Red Rewards
Deal Registration
Case Studies & White Papers
Webinars
Helpful Tips & Articles
About Buffalo
Buffalo Compliance Information
Trademarks
Legal
Press Releases
Buffalo actively participates in the new JC-STAR program established by the Japanese Ministry of Economy, Trade and Industry (METI). This framework is a key part of our commitment to ensuring our TeraStation products meet robust cybersecurity standards.
Buffalo TeraStations use a closed operating system that does not allow users to access the OS, install programs, or change the code, thus closing off many cyberattack vectors.
Many of our customers are running security scanning software that identify versioning information of the various network services provided by the TeraStation and report on known vulnerabilities associated with that software.
Buffalo is committed to the security of our customers data. We will investigate and report on the various security vulnerabilities that may affect our systems, and publish any remediation or the results of investigations here.
The list of systems supported with this reporting are:
Vulnerabities on other systems will be addressed according to their severity, and users should consult the Firmware Update notes for a history of security patches applied.
For environments where regulatory compliance requires specific responses to vulnerability scanning sortware, Buffalo recommends the use of the above systems.
Please contact: security@buffaloamericas.com to report security issues that might affect Buffalo TeraStations.
Please note that this e-mail address is used for monitoring potential product security issues. Any and all replies may not occur unless further information is required or supplied. For technical support of Buffalo products, please visit our Support page instead.
SSL Security Ticket Cannot be trustedSSL Security Ticket is for the wrong hostThe X.509 certificate chain used by this service contains certificates with RSA keys shorter than 2048 bits.
N/A
None / All
This is an expected scan result until a certificate issued by a certifying authority is installed by the administrator
SMB/NETBIOS Vulnerabilities
CVE-1999-0505CVE-1999-0519CVE-1999-0520
None
Configuration needed. Refer to Vulnerability Page.
Apache server allows obtaining sensitive information
CVE-2003-1418
Certificate Vulnerability
CVE-2004-2761
Configuration needed. Refer to vulnerability page.
Insecure Ciphers in Apache Tomcat
CVE-2007-1858
OpenSSH bypass timeout checks and XSECURITY restrictions
CVE-2015-5352
TS6000TS5010TS3020/3010
OpenSSH security bypass in the kbdint_next_device() functionOpenSSH accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requestsOpenSSH use-after-free error in sshd when handling a MONITOR_REQ_PAM_FREE_CTX requestOpenSSH setting insecure world-writable permissions for TTYs
CVE-2015-5600CVE-2015-6563CVE-2015-6564CVE-2015-6565
Open SSH when UseLogin feature is enabledOpenSSH with SHA256 or SHA512
CVE-2015-8325CVE-2016-6210
OpenSSH requesting transmission of an entire bufferOpenSSH heap-base overflow in roaming_common.c
CVE-2016-0777CVE-2016-0778
Open SSH untrusted X11 forwarding
CVE-2016-1908
Denial of Service VulnerabilityVulnerability in OpenSSL DSA private key acquisitonDenial of Service (DoS) Vulnerability in OpenSSL crypto/ts/ts_lib.c
CVE-2016-2177CVE-2016-2178CVE-2016-2180
TS5010TS3020/TS3010
Upgrade to firmware 4.80 or later
Denial of Service (DoS) Vulnerability in OpenSSL DTLSDenial of Service Vulnerability in OpenSSL DTLS_antireplay
CVE-2016-2179CVE-2016-2181
Denial of Service (DoS) Vulnerability in OpenSSL crypto/bn/bn_print.c
CVE-2016-2182
TS6000TS5020/5010TS3020/3010
DES and Triple DES ciphers "Sweet32"
CVE-2016-2183
Update Firmware to 4.32 or later.
Denial of Service (DoS) Vulnerability in OpenSSL's ssl/t1_lib.cInteger overflow vulnerability in OpenSSL's crypto/mdc2/mdc2dgst.c
CVE-2016-6302CVE-2016-6303
Denial of Service (DoS) Vulnerability
CVE-2016-6304
OpenSSH arbitrary code execution multiple vulnerabilities
CVE-2016-10009CVE-2016-10011CVE-2016-10012CVE-2016-10708
TS6000TS5010TS3020 / TS3010
Update Firmware to 4.56 or later (TS5010/3010/3020)
Update Firmware to 5.12 or later (TS6000)
OpenSSH gain of privilege related to serverloop.c
CVE-2016-10010
Samba remote code execution vulnerability
CVE-2017-7494
TS5010/3010/3020
SSH server file creation restriction bypass vulnerability.
CVE-2017-15906
s4u2proxy unkeyed checksum
CVE-2018-16860
Samba Active Directory DoS in ldb_qsort and dns_name_compareSamba Active Directory Kerberos sets forwardable flag
CVE-2019-14861CVE-2019-14870
ACL Inheritance in Samba AD DCCrash after failed character conversion
CVE-2019-14902CVE-2019-14907
Samba Active Directory CPU and use-after-free DoS vulnerabilities
CVE-2020-10730CVE-2020-10745CVE-2020-10760CVE-2020-14303
Missing handle permissions check in Samba ChangeNotify
CVE-2020-14318
TS7010TS6000TS5020/5010TS3020/3010
AFP Vulnerabilities
CVE-2021-31439CVE-2022-23121CVE-2022-0194CVE-2022-23122CVE-2022-23125CVE-2022-23123CVE-2022-23124
Disable AFP to workaround.Workaround details on page.
Samba information disclosure with SMB1Samba vfs_fruit out of bounds heapSamba AD server can arbitrarily rewrite SPN
CVE-2021-44141CVE-2021-44142CVE-2022-0336
OpenSSH before 8.5 has a double free in ssh-agent
CVE-2021-28041
TS7010
Samba server heap buffer overflow
CVE-2022-3437
TS7010TS6000TS5020 / TS5010TS3020 / TS3010
Samba Active Directory elevation of privilege vulnerabilities
CVE-2022-37966CVE-2022-37967CVE-2022-38023CVE-2022-45141
Samba 32-Bit Systems Buffer Overflow
CVE-2022-42898
Arbitrary code execution on affected installations of Netatalk
CVE-2022-43634
Samba Active Directory Bitlocker KeysSamba Active Directory admin tool signed-only connection
CVE-2023-0164CVE-2023-0922
SMB Signing not required
The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path
CVE-2023-38408
OpenSSH incorrectly handled signal management
CVE-2024-6387
TS7010TS5020/3030
Rsync remote code execution
CVE-2024-12085
OpenSSL Vulnerabilities
CVE-2025-9230CVE-2025-9232CVE-2025-53020
Apache HTTP Server Vulnerabilities
CVE-2024-42516CVE-2024-43204CVE-2024-43394CVE-2024-47252CVE-2025-23048CVE-2025-49630CVE-2025-49812
Samba command injection vulnerability
CVE-2025-10230
none
Guest users enumerate privileges
CVE-2025-66954
All NAS products
This site uses cookies in order to improve your user experience and to provide content tailored specifically to your interest. By continuing to browse our site, you agree to our use of cookies. You can view our Privacy Notice here.