Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h38h-r53h-rjqg

Опубликовано: 03 мая 2024
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

D-Link D-View Use of Hard-coded Cryptographic Key Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of D-Link D-View. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the TokenUtils class. The issue results from a hard-coded cryptographic key. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-19659.

D-Link D-View Use of Hard-coded Cryptographic Key Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of D-Link D-View. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the TokenUtils class. The issue results from a hard-coded cryptographic key. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-19659.

EPSS

Процентиль: 86%
0.02737
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-321

Связанные уязвимости

CVSS3: 9.8
nvd
почти 2 года назад

D-Link D-View Use of Hard-coded Cryptographic Key Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of D-Link D-View. Authentication is not required to exploit this vulnerability. The specific flaw exists within the TokenUtils class. The issue results from a hard-coded cryptographic key. An attacker can leverage this vulnerability to bypass authentication on the system. . Was ZDI-CAN-19659.

CVSS3: 9.8
fstec
больше 2 лет назад

Уязвимость компонента TokenUtils платформы управления сетевыми устройствами D-View 8, позволяющая нарушителю обойти процедуру аутентификации

EPSS

Процентиль: 86%
0.02737
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-321