Remote Code Execution Risk in D-Link DNS-320L and DNS-340L
CVE-2024-3272

9.8CRITICAL

Key Information:

Vendor
D-link
Vendor
CVE Published:
4 April 2024

Badges

πŸ“ˆ TrendedπŸ“ˆ Score: 4,310πŸ‘Ύ Exploit Exists🟑 Public PoCπŸ¦… CISA ReportedπŸ“° News Worthy

What is CVE-2024-3272?

CVE-2024-3272 is a critical vulnerability affecting several models of D-Link network storage devices, namely the DNS-320L, DNS-325, DNS-327L, and DNS-340L. These devices are intended for home and small business environments, providing centralized data storage and sharing capabilities over a network. The vulnerability arises from improper processing within the HTTP GET request handler specifically related to a file responsible for managing NAS sharing. This issue can be exploited remotely to access hard-coded credentials, posing serious risks to organizations still using these unsupported devices.

Technical Details

The vulnerability concerns the manipulation of the user argument in the file /cgi-bin/nas_sharing.cgi through an HTTP GET request. Attackers can exploit this flaw to retrieve hard-coded credentials, which enables unauthorized access to the device's functionalities. The vulnerability has been classified as "very critical," reflecting the ease of exploitation and the significant risk posed to users. Importantly, these D-Link models are no longer supported by the vendor, meaning no security updates or patches will be provided to mitigate this issue.

Impact of the Vulnerability

  1. Remote Unauthorized Access: The vulnerability allows attackers to gain access to sensitive data stored on the affected devices. With hard-coded credentials accessible, unauthorized actors can potentially manipulate, steal, or delete critical files.

  2. Data Breach Risks: Exploiting this vulnerability puts organizations at risk of significant data breaches. Malicious actors could extract sensitive information, leading to potential compliance violations and reputational damage.

  3. System Compromise: The ability to exploit the vulnerability remotely raises the possibility of broader system compromise within an organization’s network. Once inside, attackers may use the vulnerable device as a foothold to launch further attacks on other connected systems or data repositories.

CISA Reported

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace

The CISA's recommendation is: This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.

Affected Version(s)

DNS-320L 20240403

DNS-325 20240403

DNS-327L 20240403

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Hackers Actively Exploit Critical D-Link NAS Vulnerabilities on EoL Devices

In late March 2024, critical vulnerabilities were disclosed in D-Link NAS devices, allowing unauthorized access and command execution. Nearly 92,000 devices were at risk, attracting threat actors. D-Link issued a security advisory and recommended upgrading affected devices, implementing security mea...

9 months ago

CISA adds D-Link multiple NAS devices bugs to its Known Exploited Vulnerabilities catalog

CISA adds D-Link multiple NAS devices bugs to its Known Exploited Vulnerabilities catalog

9 months ago

Exploitation of Unpatched D-Link NAS Device Vulnerabilities Soars

Second identifier, CVE-2024-3272, assigned to unpatched D-Link NAS device vulnerabilities, just as exploitation attempts soar.Β 

9 months ago

References

EPSS Score

6% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ“ˆ

    Vulnerability started trending

  • πŸ¦…

    CISA Reported

  • πŸ‘Ύ

    Exploit known to exist

  • πŸ“°

    First article discovered by SharkStriker

  • Vulnerability published

Collectors

NVD DatabaseMitre DatabaseCISA Database2 Proof of Concept(s)4 News Article(s)

Credit

netsecfish
.