The D-View 8 network management suite has two primary susceptibilities. This vulnerability enables hackers from all over the world to avoid authentication and allow arbitrary code execution.
The D-View software is designed by the Taiwanese networking solutions seller D-Link. This software is utilized by businesses of all scales, as it helps in managing performance, directing device configurations, and network maps generation. With the help of this software, managing as well as administering networks has become structured and time-saving.
However, with benefits, there comes some limitation as well. The security researchers who joined Trend Micro’s Zero Day Initiative (ZDI) found six limitations in the software. These limitations affected the D-View so, on 23 December 2022 was reported to the seller.
Two out of the six faults raised the most worries, as it allows attackers to control the impacted installations. They recorded the first vulnerability as CVE-2023-32165 which is a remote code execution limitation. This fault arose due to the absence of an adequate validation path that is supplied by a user to use it in the file operation.
Due to this, the hacker taking advantage of the fault can perform code using the system privileges. In Windows, the code will work with the top privileges, enabling them to take over the whole system.
They tracked the second fault as CVE-2023-32169. This lets the attacker avoid the authentication step. Due to a hard-coded cryptographic key on the TokenUtils software’s class, this issue rose.
These faults when taken advantage of enabled the increase in privilege, disapproved information access, and modifying configuration and software settings. It also allows the exploiter to install malware and backdoors.
The flaws that the ZDI discovered, D-Link issued a recommendation for them. This affected the D-View 8 version 18.104.22.168 and asked the admins to install the fixed version. 22.214.171.124, which was launched on May 17, 2023.
“As soon as D-Link was made aware of the reported security issues, we had promptly started our investigation and began developing security patches,” D-Link published regarding their concerns about the flaws.
Nevertheless, the seller has advised the users to install the security update. The announcement also alerts that it is a ‘beta software or hot-fix release’ that isn’t done with the eventual testing. This signifies that updating to the 126.96.36.199 version can arise issues or might cause unreliability to D-View. However, no matter how severe the faults are, their performance will have no possible flaws.
The company has recommended that users should inspect the hardware revision of the products. This can be done by verifying the lower side label or the web configuration panel before you download the corresponding firmware upgrade.
Leave a reply