ID

VAR-201708-0273


CVE

CVE-2014-7857


TITLE

plural D-Link Authentication vulnerabilities in product firmware

Trust: 0.8

sources: JVNDB: JVNDB-2014-008363

DESCRIPTION

D-Link DNS-320L firmware before 1.04b12, DNS-327L before 1.03b04 Build0119, DNR-326 1.40b03, DNS-320B 1.02b01, DNS-345 1.03b06, DNS-325 1.05b03, and DNS-322L 2.00b07 allow remote attackers to bypass authentication and log in with administrator permissions by passing the cgi_set_wto command in the cmd parameter, and setting the spawned session's cookie to username=admin. plural D-Link There are authentication vulnerabilities in the product firmware.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-link specializes in the design and development of wireless network and Ethernet road hardware products. Multiple D-link products have security vulnerabilities that allow an attacker to exploit the vulnerability to bypass the authentication mechanism and gain unauthorized access. Multiple D-Link Products are prone to multiple authentication-bypass vulnerabilities. This may aid in further attacks. D-Link DNS-320L and others are network storage devices of D-Link. A security vulnerability exists in several D-Link products. The following products and versions are affected: D-Link DNS-320L with firmware version prior to 1.04b12; DNS-327L with firmware version prior to 1.03b04 Build0119; DNR-326 with firmware version 1.40b03; DNS with firmware version 1.02b01 -320B; DNS-345 with firmware version 1.03b06; DNS-325 with firmware version 1.05b03; DNS-322L with firmware version 2.00b07. Overwiew -------- SEARCH-LAB performed an independent security assessment on four different D-Link devices. The assessment has identified altogether 53 unique vulnerabilities in the latest firmware (dated 30-07-2014). Several vulnerabilities can be abused by a remote attacker to execute arbitrary code and gain full control over the devices. We list below several of the problematic areas, where the most critical findings were discovered: - Authentication can be bypassed in several ways, allowing an attacker to take full control over the device without the need to exploit any programming or design bugs. - We found a few half-baked security workarounds to fix earlier vulnerabilities that introduced even more serious problems, leading to command injection and the possibility to take full control over the device. - Even though there were several security patches and workarounds in the session management part of the code, where we still found serious problems. It was still possible to perform unauthenticated file upload to an arbitrarily chosen location, which also lead to the possibility for an attacker to take full control over the device. - Default users (root, nobody) can be used during authentication, and the administrator cannot change the default (empty) password of these users from the user interface. Details and CVEs ---------------- For the specific details see our full report in [SL-ADV]. We suppose that some of the vulnerabilities were discovered by other researchers too, but we saw it reasonable and useful to publish our findings in such a comprehensive study. Naturally in the report we tried to find and reference all of the previous publications that may have found the same problems. We obtained the following CVE numbers for the above described vulnerabilities: - CVE-2014-7858: Check_login bypass vulnerability in DNR-326 - CVE-2014-7859: Buffer overflow in login_mgr.cgi and in file_sharing.cgi - CVE-2014-7860: Unauthenticated photo publish We also reported two other authentication bypass vulnerabilities (CVE-2014-7857) to D-Link; but since these problems have not been addressed correctly yet, we will only publish them after 22/06/2015. Affected devices ---------------- Main targeted devices during the assessment: - DNS-320, Revision A: 2.03, 13/05/2013 - DNS-320L, 1.03b04, 11/11/2013 - DNS-327L, 1.02, 02/07/2014 - DNR-326, 1.40b03, 7/19/2013 Other devices were influenced by one or more vulnerabilities: - DNS-320B, 1,02b01, 23/04/2014 - DNS-345, 1.03b06, 30/07/2014 - DNS-325, 1.05b03, 30/12/2013 - DNS-322L, 2.00b07 See [SL-ADV] for the complete vulnerability matrix at the time of the assessment. We note that other devices may also be vulnerable. Solution -------- Most of the vulnerabilities were fixed in: - DNS-320L 1.04.B12 - DNS-327L 1.03.B04 Some of the vulnerabilities were fixed in: - DNR-326 2.10.B03 - DNR-322L 2.10.B03 Besides installing the patches, where available, we highly recommend not to expose the web interface of the DNS and DNR devices to the internet. Since the devices use the UPnP feature, you should disable it in the router. Credits ------- These vulnerabilities were discovered and researched by Gergely Eberhardt (@ebux25) from SEARCH-LAB Ltd

Trust: 2.7

sources: NVD: CVE-2014-7857 // JVNDB: JVNDB-2014-008363 // CNVD: CNVD-2015-03603 // BID: 74880 // VULHUB: VHN-75802 // VULMON: CVE-2014-7857 // PACKETSTORM: 132075

IOT TAXONOMY

category:['IoT', 'Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-03603

AFFECTED PRODUCTS

vendor:d linkmodel:dns-325scope:lteversion:1.05b03

Trust: 1.0

vendor:d linkmodel:dnr-326scope:lteversion:1.40b03

Trust: 1.0

vendor:d linkmodel:dns-327lscope:lteversion:1.02

Trust: 1.0

vendor:d linkmodel:dns-320lscope:lteversion:1.03b04

Trust: 1.0

vendor:d linkmodel:dns-320bscope:lteversion:1.02b01

Trust: 1.0

vendor:d linkmodel:dns-322lscope:lteversion:2.00b07

Trust: 1.0

vendor:d linkmodel:dns-345scope:lteversion:1.03b06

Trust: 1.0

vendor:d linkmodel:dns-327lscope:eqversion:1.02

Trust: 0.9

vendor:d linkmodel:d-link dnr-326scope:eqversion:1.40b03

Trust: 0.8

vendor:d linkmodel:d-link dns-320bscope:eqversion:1.02b01

Trust: 0.8

vendor:d linkmodel:d-link dns-320lscope:ltversion:1.04b12

Trust: 0.8

vendor:d linkmodel:d-link dns-322lscope:eqversion:2.00b07

Trust: 0.8

vendor:d linkmodel:d-link dns-325scope:eqversion:1.05b03

Trust: 0.8

vendor:d linkmodel:d-link dns-327lscope:ltversion:1.03b04 build0119

Trust: 0.8

vendor:d linkmodel:d-link dns-345scope:eqversion:1.03b06

Trust: 0.8

vendor:d linkmodel:routerscope: - version: -

Trust: 0.6

vendor:d linkmodel:dnr-326scope:eqversion:1.40b03

Trust: 0.6

vendor:d linkmodel:dns-320lscope:eqversion:1.03b04

Trust: 0.6

vendor:d linkmodel:dns-320bscope:eqversion:1.02b01

Trust: 0.6

vendor:d linkmodel:dns-345scope:eqversion:1.03b06

Trust: 0.6

vendor:d linkmodel:dns-322lscope:eqversion:2.00b07

Trust: 0.6

vendor:d linkmodel:dns-325scope:eqversion:1.05b03

Trust: 0.6

vendor:d linkmodel:dns-345 1.03b06scope: - version: -

Trust: 0.3

vendor:d linkmodel:dns-325 1.05b03scope: - version: -

Trust: 0.3

vendor:d linkmodel:dns-322l 2.00b07scope: - version: -

Trust: 0.3

vendor:d linkmodel:dns-320l 1.03b04scope: - version: -

Trust: 0.3

vendor:d linkmodel:dns-320b 1.02b01scope: - version: -

Trust: 0.3

vendor:d linkmodel:dns-320scope:eqversion:2.03

Trust: 0.3

vendor:d linkmodel:dnr-326 1.40b03scope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2015-03603 // BID: 74880 // JVNDB: JVNDB-2014-008363 // CNNVD: CNNVD-201506-080 // NVD: CVE-2014-7857

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-7857
value: CRITICAL

Trust: 1.0

NVD: CVE-2014-7857
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2015-03603
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201506-080
value: CRITICAL

Trust: 0.6

VULHUB: VHN-75802
value: HIGH

Trust: 0.1

VULMON: CVE-2014-7857
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-7857
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2015-03603
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-75802
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2014-7857
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2015-03603 // VULHUB: VHN-75802 // VULMON: CVE-2014-7857 // JVNDB: JVNDB-2014-008363 // CNNVD: CNNVD-201506-080 // NVD: CVE-2014-7857

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

sources: VULHUB: VHN-75802 // JVNDB: JVNDB-2014-008363 // NVD: CVE-2014-7857

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 132075 // CNNVD: CNNVD-201506-080

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201506-080

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-008363

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-75802

PATCH

title:DNS-320Lurl:http://support.dlink.com/ProductInfo.aspx?m=DNS-320L

Trust: 0.8

title:DNS-327Lurl:http://support.dlink.com/ProductInfo.aspx?m=DNS-327L

Trust: 0.8

title:DNS-345url:http://support.dlink.com/ProductInfo.aspx?m=DNS-345

Trust: 0.8

title:DNS-325url:http://support.dlink.com/ProductInfo.aspx?m=DNS-325

Trust: 0.8

title:DNR-326url:http://support.dlink.com/ProductInfo.aspx?m=DNR-326

Trust: 0.8

title:DNR-322Lurl:http://support.dlink.com/ProductInfo.aspx?m=DNR-322L

Trust: 0.8

title:DNS-320url:http://support.dlink.com/ProductInfo.aspx?m=DNS-320

Trust: 0.8

title:Multiple D-Link Product security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=234993

Trust: 0.6

sources: JVNDB: JVNDB-2014-008363 // CNNVD: CNNVD-201506-080

EXTERNAL IDS

db:NVDid:CVE-2014-7857

Trust: 3.6

db:BIDid:74880

Trust: 2.7

db:PACKETSTORMid:132075

Trust: 1.9

db:JVNDBid:JVNDB-2014-008363

Trust: 0.8

db:CNNVDid:CNNVD-201506-080

Trust: 0.7

db:CNVDid:CNVD-2015-03603

Trust: 0.6

db:VULHUBid:VHN-75802

Trust: 0.1

db:VULMONid:CVE-2014-7857

Trust: 0.1

sources: CNVD: CNVD-2015-03603 // VULHUB: VHN-75802 // VULMON: CVE-2014-7857 // BID: 74880 // JVNDB: JVNDB-2014-008363 // PACKETSTORM: 132075 // CNNVD: CNNVD-201506-080 // NVD: CVE-2014-7857

REFERENCES

url:http://www.search-lab.hu/media/d-link_security_advisory_3_0_public.pdf

Trust: 3.0

url:http://www.securityfocus.com/bid/74880

Trust: 2.5

url:http://www.securityfocus.com/archive/1/535626/100/200/threaded

Trust: 1.8

url:http://seclists.org/fulldisclosure/2015/may/125

Trust: 1.8

url:http://packetstormsecurity.com/files/132075/d-link-bypass-buffer-overflow.html

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-7857

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-7857

Trust: 0.8

url:http://www.dlink.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/287.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://support.dlink.com/productinfo.aspx?m=dns-345

Trust: 0.1

url:http://support.dlink.com/productinfo.aspx?m=dns-320

Trust: 0.1

url:http://support.dlink.com/productinfo.aspx?m=dns-320l

Trust: 0.1

url:http://support.dlink.com/productinfo.aspx?m=dns-325

Trust: 0.1

url:http://support.dlink.com/productinfo.aspx?m=dnr-322l

Trust: 0.1

url:http://support.dlink.com/productinfo.aspx?m=dns-327l

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7859

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7858

Trust: 0.1

url:https://www.search-lab.hu)

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7860

Trust: 0.1

url:http://support.dlink.com/productinfo.aspx?m=dnr-326

Trust: 0.1

sources: CNVD: CNVD-2015-03603 // VULHUB: VHN-75802 // VULMON: CVE-2014-7857 // BID: 74880 // JVNDB: JVNDB-2014-008363 // PACKETSTORM: 132075 // CNNVD: CNNVD-201506-080 // NVD: CVE-2014-7857

CREDITS

Search-Laboratory Ltd.

Trust: 0.9

sources: BID: 74880 // CNNVD: CNNVD-201506-080

SOURCES

db:CNVDid:CNVD-2015-03603
db:VULHUBid:VHN-75802
db:VULMONid:CVE-2014-7857
db:BIDid:74880
db:JVNDBid:JVNDB-2014-008363
db:PACKETSTORMid:132075
db:CNNVDid:CNNVD-201506-080
db:NVDid:CVE-2014-7857

LAST UPDATE DATE

2024-11-23T22:07:17.960000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-03603date:2015-06-05T00:00:00
db:VULHUBid:VHN-75802date:2018-10-09T00:00:00
db:VULMONid:CVE-2014-7857date:2018-10-09T00:00:00
db:BIDid:74880date:2015-05-28T00:00:00
db:JVNDBid:JVNDB-2014-008363date:2017-09-28T00:00:00
db:CNNVDid:CNNVD-201506-080date:2023-04-27T00:00:00
db:NVDid:CVE-2014-7857date:2024-11-21T02:18:08.910

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-03603date:2015-06-05T00:00:00
db:VULHUBid:VHN-75802date:2017-08-25T00:00:00
db:VULMONid:CVE-2014-7857date:2017-08-25T00:00:00
db:BIDid:74880date:2015-05-28T00:00:00
db:JVNDBid:JVNDB-2014-008363date:2017-09-28T00:00:00
db:PACKETSTORMid:132075date:2015-05-28T13:03:33
db:CNNVDid:CNNVD-201506-080date:2015-05-28T00:00:00
db:NVDid:CVE-2014-7857date:2017-08-25T18:29:00.230