ID

VAR-201701-0477


CVE

CVE-2016-10125


TITLE

D-Link DGS-1100 Device Rev.B Firmware spoofing device vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2016-006715

DESCRIPTION

D-Link DGS-1100 devices with Rev.B firmware 1.01.018 have a hardcoded SSL private key, which allows man-in-the-middle attackers to spoof devices by hijacking an HTTPS session. The D-Link DGS-1100 is an Ethernet switch from D-Link. DLink DGS-1100 switch is prone to a local security-bypass vulnerability. Successfully exploiting this issue allows attackers to perform man-in-the-middle attacks or impersonate trusted servers, which will aid in further attacks

Trust: 2.52

sources: NVD: CVE-2016-10125 // JVNDB: JVNDB-2016-006715 // CNVD: CNVD-2017-00456 // BID: 95329 // VULHUB: VHN-88870

IOT TAXONOMY

category:['IoT', 'Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-00456

AFFECTED PRODUCTS

vendor:dlinkmodel:dgs-1100scope:eqversion:1.01.018

Trust: 1.6

vendor:d linkmodel:dgs-1100scope:eqversion:(rev.b) 1.01.018

Trust: 0.8

vendor:d linkmodel:dgs-1100-05scope: - version: -

Trust: 0.8

vendor:d linkmodel:dgs-1100-05pdscope: - version: -

Trust: 0.8

vendor:d linkmodel:dgs-1100-08scope: - version: -

Trust: 0.8

vendor:d linkmodel:dgs-1100-08pscope: - version: -

Trust: 0.8

vendor:d linkmodel:dgs-1100-10mpscope: - version: -

Trust: 0.8

vendor:d linkmodel:dgs-1100-10mppscope: - version: -

Trust: 0.8

vendor:d linkmodel:dgs-1100-16scope: - version: -

Trust: 0.8

vendor:d linkmodel:dgs-1100-18scope: - version: -

Trust: 0.8

vendor:d linkmodel:dgs-1100-24scope: - version: -

Trust: 0.8

vendor:d linkmodel:dgs-1100-24pscope: - version: -

Trust: 0.8

vendor:d linkmodel:dgs-1100-26scope: - version: -

Trust: 0.8

vendor:d linkmodel:dgs-1100-26mpscope: - version: -

Trust: 0.8

vendor:d linkmodel:dgs-1100scope:eqversion:1.01.018

Trust: 0.6

vendor:dlinkmodel:revbscope:eqversion:1.1.18

Trust: 0.3

vendor:dlinkmodel:dgs-1100 series gigabit smart managed switchesscope:eqversion:1.1.18

Trust: 0.3

sources: CNVD: CNVD-2017-00456 // BID: 95329 // JVNDB: JVNDB-2016-006715 // CNNVD: CNNVD-201701-159 // NVD: CVE-2016-10125

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-10125
value: HIGH

Trust: 1.0

NVD: CVE-2016-10125
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-00456
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201701-159
value: HIGH

Trust: 0.6

VULHUB: VHN-88870
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-10125
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-00456
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-88870
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-10125
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-00456 // VULHUB: VHN-88870 // JVNDB: JVNDB-2016-006715 // CNNVD: CNNVD-201701-159 // NVD: CVE-2016-10125

PROBLEMTYPE DATA

problemtype:CWE-798

Trust: 1.9

sources: VULHUB: VHN-88870 // JVNDB: JVNDB-2016-006715 // NVD: CVE-2016-10125

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201701-159

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-201701-159

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-006715

PATCH

title:DGS-1100 Seriesurl:http://www.dlink.com/uk/en/business-solutions/switching/smart-switches/dgs-1100-series-gigabit-smart-switches

Trust: 0.8

sources: JVNDB: JVNDB-2016-006715

EXTERNAL IDS

db:NVDid:CVE-2016-10125

Trust: 3.4

db:BIDid:95329

Trust: 2.6

db:JVNDBid:JVNDB-2016-006715

Trust: 0.8

db:CNNVDid:CNNVD-201701-159

Trust: 0.7

db:CNVDid:CNVD-2017-00456

Trust: 0.6

db:VULHUBid:VHN-88870

Trust: 0.1

sources: CNVD: CNVD-2017-00456 // VULHUB: VHN-88870 // BID: 95329 // JVNDB: JVNDB-2016-006715 // CNNVD: CNNVD-201701-159 // NVD: CVE-2016-10125

REFERENCES

url:https://labs.integrity.pt/advisories/dlink-dgs-1100-hardcoded-keys/

Trust: 3.4

url:http://www.securityfocus.com/bid/95329

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-10125

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-10125

Trust: 0.8

url:http://www.dlink.co.in/

Trust: 0.3

sources: CNVD: CNVD-2017-00456 // VULHUB: VHN-88870 // BID: 95329 // JVNDB: JVNDB-2016-006715 // CNNVD: CNNVD-201701-159 // NVD: CVE-2016-10125

CREDITS

Bruno Morisson.

Trust: 0.3

sources: BID: 95329

SOURCES

db:CNVDid:CNVD-2017-00456
db:VULHUBid:VHN-88870
db:BIDid:95329
db:JVNDBid:JVNDB-2016-006715
db:CNNVDid:CNNVD-201701-159
db:NVDid:CVE-2016-10125

LAST UPDATE DATE

2025-04-20T23:31:04.649000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-00456date:2017-01-16T00:00:00
db:VULHUBid:VHN-88870date:2017-01-13T00:00:00
db:BIDid:95329date:2017-01-12T00:14:00
db:JVNDBid:JVNDB-2016-006715date:2017-01-23T00:00:00
db:CNNVDid:CNNVD-201701-159date:2023-04-27T00:00:00
db:NVDid:CVE-2016-10125date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-00456date:2017-01-16T00:00:00
db:VULHUBid:VHN-88870date:2017-01-09T00:00:00
db:BIDid:95329date:2017-01-09T00:00:00
db:JVNDBid:JVNDB-2016-006715date:2017-01-23T00:00:00
db:CNNVDid:CNNVD-201701-159date:2017-01-10T00:00:00
db:NVDid:CVE-2016-10125date:2017-01-09T17:59:00.130