Home » Technology » D-Link released patches for security flaws that were making your business vulnerable to attack

D-Link released patches for security flaws that were making your business vulnerable to attack

D-Link has recently faced some legit security flaws that could’ve left your business vulnerable to threat actors’ attempts to reach sensitive information. Though it has already released patches for these flaws that were found in its network management suite, These flaws could’ve let threat actors bypass authentication and execute arbitrary code remotely. D-Link’s network management suite works for businesses and deals with their network management along with administration.

Security researchers participating in Trend Micro’s Zero Day Initiative (ZDI) late last year found the issues. Researchers discovered several vulnerabilities during the incident, but CVE-2023-32165 and CVE-2023-32169 stood out. With the former’s remote code execution issue, malicious code might be executed with system privileges. The latter, on the other hand, is an authentication bypass vulnerability that permits privilege escalation, unauthorised access to information, and occasionally the installation of malware.

Beta Patch

The severity rating for both flaws is 9.8 (critical). D-View 8 versions 2.9.1.27 and earlier are affected by the problem. D-Link urged consumers to install the fix as soon as possible after it was issued about two weeks ago.

The business stated in a security advisory that “as soon as D-Link was made aware of the reported security issues, we promptly started our investigation and began developing security patches.” Users were also advised by the vendor that the patch was essentially a “hot-fix release” or “beta software,” suggesting that further changes could be made in the future. Additionally, it implies that following the application of the patch, the D-View could become unstable or crash.

To avoid downloading the incorrect firmware update, the manufacturer additionally advised users to check the endpoints’ underside labels or web configuration panels to determine the hardware revision.

The list of vulnerabilities spotted is as follows:

  • ZDI-CAN-19496: D-Link D-View TftpSendFileThread Directory Traversal Information Disclosure Vulnerability
  • ZDI-CAN-19497: D-Link D-View TftpReceiveFileHandler Directory Traversal Remote Code Execution Vulnerability
  • ZDI-CAN-19527: D-Link D-View Upload File Directory Traversal Arbitrary File Creation Vulnerability
  • ZDI-CAN-19529: D-Link D-View upload Mib Directory Traversal Arbitrary File Creation or Deletion Vulnerability
  • ZDI-CAN-19534: D-Link D-View show User Improper Authorization Privilege Escalation ZDI-CAN-19659: D-Link D-View Use of Hard-coded Cryptographic Key Authentication Bypass Vulnerability