ID

VAR-201111-0163


CVE

CVE-2011-4507


TITLE

D-Link DIR-685 Xtreme N storage router WPA/WPA2 encryption failure

Trust: 0.8

sources: CERT/CC: VU#924307

DESCRIPTION

The D-Link DIR-685 router, when certain WPA and WPA2 configurations are used, does not maintain an encrypted wireless network during transfer of a large amount of network traffic, which allows remote attackers to obtain sensitive information or bypass authentication via a Wi-Fi device. D-Link DIR-685 Xtreme N Storage Router Is WPA/WPA2 There is a vulnerability in which communication is performed without encryption even if it is set. D-Link DIR-685 Xtreme N Storage Router Is AES Using crypto WPA-PSK, WPA2-PSK Even if it is set to communicate with, there is a vulnerability that communication is performed without encryption under heavy load conditions such as huge data transmission processing. After that, communication is not encrypted until the device is restarted.Radio of applicable equipment LAN Communication contents may be intercepted by a third party within reach. The D-Link DIR-685 is a wireless router device. The device needs to be restarted to restore the original encryption state. D-Link DIR-685 is prone to an authentication-bypass vulnerability. Attackers can exploit this issue to connect to the affected device without authentication. This may aid in further attacks. D-Link is a network company founded by Taiwan D-Link Group, dedicated to the R&D, production and marketing of LAN, broadband network, wireless network, voice network and related network equipment. ---------------------------------------------------------------------- Ovum says ad hoc tools are out-dated. The best practice approach? Fast vulnerability intelligence, threat handling, and setup in one tool. Read the new report on the Secunia VIM: http://secunia.com/products/corporate/vim/ovum_2011_request/ ---------------------------------------------------------------------- TITLE: D-Link DIR-685 Xtreme N Storage Router Encryption Failure Weakness SECUNIA ADVISORY ID: SA46380 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/46380/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=46380 RELEASE DATE: 2011-10-13 DISCUSS ADVISORY: http://secunia.com/advisories/46380/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/46380/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=46380 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A weakness has been reported in D-Link DIR-685 Xtreme N Storage Router, which can be exploited by malicious people to bypass certain security restrictions. The weakness is caused due to an error in the router when configured with WPA/WPA2 and an AES pre-shared key (PSK) cipher. SOLUTION: Do not use an AES pre-shared key (PSK) cipher. PROVIDED AND/OR DISCOVERED BY: Jerry Decime via US-CERT. ORIGINAL ADVISORY: US-CERT: http://www.kb.cert.org/vuls/id/924307 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 3.33

sources: NVD: CVE-2011-4507 // CERT/CC: VU#924307 // JVNDB: JVNDB-2011-002374 // CNVD: CNVD-2011-4082 // BID: 50033 // VULHUB: VHN-52452 // PACKETSTORM: 105758

IOT TAXONOMY

category:['IoT', 'Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2011-4082

AFFECTED PRODUCTS

vendor:dlinkmodel:dir-685scope:eqversion:*

Trust: 1.0

vendor:d linkmodel: - scope: - version: -

Trust: 0.8

vendor:d linkmodel:dir-685scope:eqversion:xtreme n storage router

Trust: 0.8

vendor:d linkmodel:dir-685scope: - version: -

Trust: 0.6

vendor:dlinkmodel:dir-685scope: - version: -

Trust: 0.6

vendor:d linkmodel:dir-685scope:eqversion:0

Trust: 0.3

sources: CERT/CC: VU#924307 // CNVD: CNVD-2011-4082 // BID: 50033 // JVNDB: JVNDB-2011-002374 // CNNVD: CNNVD-201111-369 // NVD: CVE-2011-4507

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-4507
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#924307
value: 0.60

Trust: 0.8

NVD: CVE-2011-4507
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201111-369
value: HIGH

Trust: 0.6

VULHUB: VHN-52452
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2011-4507
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-52452
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#924307 // VULHUB: VHN-52452 // JVNDB: JVNDB-2011-002374 // CNNVD: CNNVD-201111-369 // NVD: CVE-2011-4507

PROBLEMTYPE DATA

problemtype:CWE-310

Trust: 1.9

sources: VULHUB: VHN-52452 // JVNDB: JVNDB-2011-002374 // NVD: CVE-2011-4507

THREAT TYPE

remote

Trust: 1.2

sources: CNNVD: CNNVD-201110-173 // CNNVD: CNNVD-201111-369

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201110-173

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-002374

PATCH

title:DIR-685 Xtreme N Storage Routerurl:http://www.dlink.com/products/?pid=DIR-685

Trust: 0.8

sources: JVNDB: JVNDB-2011-002374

EXTERNAL IDS

db:CERT/CCid:VU#924307

Trust: 4.3

db:NVDid:CVE-2011-4507

Trust: 2.8

db:BIDid:50033

Trust: 1.6

db:JVNDBid:JVNDB-2011-002374

Trust: 0.8

db:CNNVDid:CNNVD-201111-369

Trust: 0.7

db:CNVDid:CNVD-2011-4082

Trust: 0.6

db:CNNVDid:CNNVD-201110-173

Trust: 0.6

db:NSFOCUSid:18228

Trust: 0.6

db:SECUNIAid:46380

Trust: 0.2

db:VULHUBid:VHN-52452

Trust: 0.1

db:PACKETSTORMid:105758

Trust: 0.1

sources: CERT/CC: VU#924307 // CNVD: CNVD-2011-4082 // VULHUB: VHN-52452 // BID: 50033 // JVNDB: JVNDB-2011-002374 // PACKETSTORM: 105758 // CNNVD: CNNVD-201110-173 // CNNVD: CNNVD-201111-369 // NVD: CVE-2011-4507

REFERENCES

url:http://www.kb.cert.org/vuls/id/924307

Trust: 3.5

url:about vulnerability notes

Trust: 0.8

url:contact us about this vulnerability

Trust: 0.8

url:provide a vendor statement

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4507

Trust: 0.8

url:http://jvn.jp/cert/jvnvu924307

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4507

Trust: 0.8

url:http://www.securityfocus.com/bid/50033

Trust: 0.6

url:http://www.nsfocus.net/vulndb/18228

Trust: 0.6

url:http://www.dlink.com/products/default.aspx?pid=dir-685&tab=3

Trust: 0.3

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/46380/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/advisories/46380/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=46380

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/products/corporate/vim/ovum_2011_request/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#924307 // CNVD: CNVD-2011-4082 // VULHUB: VHN-52452 // BID: 50033 // JVNDB: JVNDB-2011-002374 // PACKETSTORM: 105758 // CNNVD: CNNVD-201110-173 // CNNVD: CNNVD-201111-369 // NVD: CVE-2011-4507

CREDITS

Jerry Decime

Trust: 0.9

sources: BID: 50033 // CNNVD: CNNVD-201110-173

SOURCES

db:CERT/CCid:VU#924307
db:CNVDid:CNVD-2011-4082
db:VULHUBid:VHN-52452
db:BIDid:50033
db:JVNDBid:JVNDB-2011-002374
db:PACKETSTORMid:105758
db:CNNVDid:CNNVD-201110-173
db:CNNVDid:CNNVD-201111-369
db:NVDid:CVE-2011-4507

LAST UPDATE DATE

2024-08-14T13:58:43.052000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#924307date:2011-10-10T00:00:00
db:CNVDid:CNVD-2011-4082date:2011-10-11T00:00:00
db:VULHUBid:VHN-52452date:2011-11-22T00:00:00
db:BIDid:50033date:2011-11-24T18:15:00
db:JVNDBid:JVNDB-2011-002374date:2013-06-26T00:00:00
db:CNNVDid:CNNVD-201110-173date:2011-10-18T00:00:00
db:CNNVDid:CNNVD-201111-369date:2011-11-23T00:00:00
db:NVDid:CVE-2011-4507date:2011-11-22T11:55:06.183

SOURCES RELEASE DATE

db:CERT/CCid:VU#924307date:2011-10-10T00:00:00
db:CNVDid:CNVD-2011-4082date:2011-10-11T00:00:00
db:VULHUBid:VHN-52452date:2011-11-22T00:00:00
db:BIDid:50033date:2011-10-10T00:00:00
db:JVNDBid:JVNDB-2011-002374date:2011-10-17T00:00:00
db:PACKETSTORMid:105758date:2011-10-13T09:15:17
db:CNNVDid:CNNVD-201110-173date:1900-01-01T00:00:00
db:CNNVDid:CNNVD-201111-369date:2011-11-24T00:00:00
db:NVDid:CVE-2011-4507date:2011-11-22T11:55:06.183