CISA KEV 정보
| 취약점명 | D-Link Multiple NAS Devices Use of Hard-Coded Credentials Vulnerability |
|---|---|
| 설명 | D-Link DNS-320L, DNS-325, DNS-327L, and DNS-340L contains a hard-coded credential that allows an attacker to conduct authenticated command injection, leading to remote, unauthorized code execution. |
| 조치사항 | This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-798 |
| 등록일 (KEV) | 2024-04-11 |
| 조치 기한 | 2024-05-02 |
| 추가 참고 | https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383; https://nvd.nist.gov/vuln/detail/CVE-2024-3272 |
NVD 상세 정보
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HAV:N/AC:L/Au:N/C:C/I:C/A:C설명: ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as very critical, has been found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. This issue affects some unknown processing of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument user with the input messagebus leads to hard-coded credentials. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259283. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
CWE: CWE-798
참조
- https://github.com/netsecfish/dlink [Exploit, Third Party Advisory]
- https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383 [Vendor Advisory]
- https://vuldb.com/?ctiid.259283 [Permissions Required]
- https://vuldb.com/?id.259283 [Third Party Advisory]
- https://github.com/netsecfish/dlink [Exploit, Third Party Advisory]
- https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383 [Vendor Advisory]
- https://vuldb.com/?ctiid.259283 [Permissions Required]
- https://vuldb.com/?id.259283 [Third Party Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-3272 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.