ID

VAR-201805-0232


CVE

CVE-2018-10641


TITLE

D-Link DIR-601 Vulnerabilities related to certificate and password management

Trust: 0.8

sources: JVNDB: JVNDB-2018-004887

DESCRIPTION

D-Link DIR-601 A1 1.02NA devices do not require the old password for a password change, which occurs in cleartext. D-Link DIR-601 Contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-601 is a wireless router product from D-Link. A security vulnerability exists in the D-LinkDIR-601A11.02NA release, which is caused by the fact that the user does not need the current password when changing the password and the program passes the new username and password in clear text. An attacker could exploit the vulnerability to obtain information by intercepting passed parameters. There is a security vulnerability in D-Link DIR-601 A1 version 1.02NA. ------------------------------------------ [Additional Information] Insecure Authentication Practices in D-LINK DIR-601 Router, Hardware version A1, Firmware Version 1.02NA When logging into the router, the authentication module passes the username and password BASE64 encoded vice encrypted. There is also no support for HTTPS connections to the router. Due to no schedule viability D-Link asks that two items are mentioned in disclosure: a) For this out of service router, users are encouraged too used DD-WRT firmware here <http://www.dd-wrt.com/site/support/router-database> b) They can contact support@dlink.com for the latest information on updates. ------------------------------------------ [VulnerabilityType Other] Weak Authentication and No HTTPS support ------------------------------------------ [Vendor of Product] D-Link ------------------------------------------ [Affected Product Code Base] DIR 601 - Hardware A1, Firmware 1.02NA ------------------------------------------ [Affected Component] Login, Password Changing ------------------------------------------ [Attack Type] Context-dependent ------------------------------------------ [Impact Information Disclosure] true ------------------------------------------ [Attack Vectors] To exploit this, an attacker must have a proxy or man-in-the-middle attack completed and be able to discern the URLs to intercept passed parameters. ------------------------------------------ [Has vendor confirmed or acknowledged the vulnerability?] true ------------------------------------------ [Remediation] Due to no schedule viability D-Link asks that two items are mentioned in disclosure: a) For this out of service router, users are encouraged too used DD-WRT firmware here b) They can contact support@dlink.com for the latest information on updates. ------------------------------------------ [References] http://us.dlink.com/security-advisories/ <http://us.dlink.com/security-advisories/> https://advancedpersistentsecurity.net/cve-2018-10641/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10641 Joe Gray

Trust: 2.43

sources: NVD: CVE-2018-10641 // JVNDB: JVNDB-2018-004887 // CNVD: CNVD-2018-09185 // VULHUB: VHN-120421 // VULMON: CVE-2018-10641 // PACKETSTORM: 147499

IOT TAXONOMY

category:['IoT', 'Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-09185

AFFECTED PRODUCTS

vendor:dlinkmodel:dir-601scope:eqversion:1.02na

Trust: 1.0

vendor:d linkmodel:dir-601scope:eqversion:a1 1.02na

Trust: 0.8

vendor:d linkmodel:dir-601 a1 1.02nascope: - version: -

Trust: 0.6

vendor:d linkmodel:dir-601scope:eqversion:1.02na

Trust: 0.6

sources: CNVD: CNVD-2018-09185 // JVNDB: JVNDB-2018-004887 // CNNVD: CNNVD-201805-187 // NVD: CVE-2018-10641

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-10641
value: HIGH

Trust: 1.0

NVD: CVE-2018-10641
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-09185
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201805-187
value: HIGH

Trust: 0.6

VULHUB: VHN-120421
value: MEDIUM

Trust: 0.1

VULMON: CVE-2018-10641
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-10641
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2018-09185
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-120421
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-10641
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2018-09185 // VULHUB: VHN-120421 // VULMON: CVE-2018-10641 // JVNDB: JVNDB-2018-004887 // CNNVD: CNNVD-201805-187 // NVD: CVE-2018-10641

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.1

problemtype:CWE-255

Trust: 0.9

sources: VULHUB: VHN-120421 // JVNDB: JVNDB-2018-004887 // NVD: CVE-2018-10641

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201805-187

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201805-187

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-004887

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-120421

PATCH

title:DIR-601url:http://support.dlink.com/ProductInfo.aspx?m=DIR-601

Trust: 0.8

title:Awesome CVE PoCurl:https://github.com/lnick2023/nicenice

Trust: 0.1

title:Awesome CVE PoCurl:https://github.com/xbl3/awesome-cve-poc_qazbnm456

Trust: 0.1

title:Awesome CVE PoCurl:https://github.com/qazbnm456/awesome-cve-poc

Trust: 0.1

sources: VULMON: CVE-2018-10641 // JVNDB: JVNDB-2018-004887

EXTERNAL IDS

db:NVDid:CVE-2018-10641

Trust: 3.3

db:JVNDBid:JVNDB-2018-004887

Trust: 0.8

db:CNNVDid:CNNVD-201805-187

Trust: 0.7

db:CNVDid:CNVD-2018-09185

Trust: 0.6

db:PACKETSTORMid:147499

Trust: 0.2

db:VULHUBid:VHN-120421

Trust: 0.1

db:VULMONid:CVE-2018-10641

Trust: 0.1

sources: CNVD: CNVD-2018-09185 // VULHUB: VHN-120421 // VULMON: CVE-2018-10641 // JVNDB: JVNDB-2018-004887 // PACKETSTORM: 147499 // CNNVD: CNNVD-201805-187 // NVD: CVE-2018-10641

REFERENCES

url:https://advancedpersistentsecurity.net/cve-2018-10641/

Trust: 3.3

url:https://gist.github.com/jocephus/806ff4679cf54af130d69777a551f819

Trust: 1.8

url:https://www.peerlyst.com/posts/vulnerability-disclosure-insecure-authentication-practices-in-d-link-router-cve-2018-10641-joe-gray

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-10641

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2018-10641

Trust: 0.9

url:https://cwe.mitre.org/data/definitions/287.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/lnick2023/nicenice

Trust: 0.1

url:https://github.com/qazbnm456/awesome-cve-poc

Trust: 0.1

url:http://www.dd-wrt.com/site/support/router-database>

Trust: 0.1

url:http://us.dlink.com/security-advisories/>

Trust: 0.1

url:http://us.dlink.com/security-advisories/

Trust: 0.1

sources: CNVD: CNVD-2018-09185 // VULHUB: VHN-120421 // VULMON: CVE-2018-10641 // JVNDB: JVNDB-2018-004887 // PACKETSTORM: 147499 // CNNVD: CNNVD-201805-187 // NVD: CVE-2018-10641

CREDITS

Joe Gray

Trust: 0.1

sources: PACKETSTORM: 147499

SOURCES

db:CNVDid:CNVD-2018-09185
db:VULHUBid:VHN-120421
db:VULMONid:CVE-2018-10641
db:JVNDBid:JVNDB-2018-004887
db:PACKETSTORMid:147499
db:CNNVDid:CNNVD-201805-187
db:NVDid:CVE-2018-10641

LAST UPDATE DATE

2024-11-23T22:30:27.093000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-09185date:2018-05-09T00:00:00
db:VULHUBid:VHN-120421date:2019-10-03T00:00:00
db:VULMONid:CVE-2018-10641date:2023-04-26T00:00:00
db:JVNDBid:JVNDB-2018-004887date:2018-06-29T00:00:00
db:CNNVDid:CNNVD-201805-187date:2019-10-23T00:00:00
db:NVDid:CVE-2018-10641date:2024-11-21T03:41:42.870

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-09185date:2018-05-09T00:00:00
db:VULHUBid:VHN-120421date:2018-05-04T00:00:00
db:VULMONid:CVE-2018-10641date:2018-05-04T00:00:00
db:JVNDBid:JVNDB-2018-004887date:2018-06-29T00:00:00
db:PACKETSTORMid:147499date:2018-05-04T17:39:19
db:CNNVDid:CNNVD-201805-187date:2018-05-07T00:00:00
db:NVDid:CVE-2018-10641date:2018-05-04T03:29:00.350