D-Link D-View Authentication Bypass Vulnerability
CVE-2024-5296

9.8CRITICAL

Key Information:

Vendor

D-link

Status
Vendor
CVE Published:
23 May 2024

Badges

๐Ÿ“ฐ News Worthy

What is CVE-2024-5296?

The D-Link D-View software contains a significant vulnerability that allows remote attackers to bypass authentication protocols. This flaw is due to a hard-coded cryptographic key used in the TokenUtils class, which can be exploited without any authentication requirements. As a result, attackers can gain unauthorized access to the system, posing a serious security risk to affected installations.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

D-View 2.0.1.28

News Articles

CVE-2024-5296 : D-LINK D-VIEW 2.0.1.28 TOKENUTILS HARD-CODED KEY - Cloud WAF

CVE-2024-5296 - D-Link D-View Use of Hard-coded Cryptographic Key Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of D-Link D-View.

References

CVSS V3.0

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • ๐Ÿ“ฐ

    First article discovered by prophaze.com

  • Vulnerability published

.