ID

VAR-202012-1643


TITLE

(0Day) D-Link DCS-960L HNAP LoginPassword Incorrect Implementation of Authentication Algorithm Authentication Bypass Vulnerability

Trust: 0.7

sources: ZDI: ZDI-20-1437

DESCRIPTION

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DCS-960L Wi-Fi cameras. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of HNAP login requests. The issue results from improper implementation of the authentication algorithm. An attacker can leverage this vulnerability to bypass authentication and execute code in the context of the device.

Trust: 0.7

sources: ZDI: ZDI-20-1437

AFFECTED PRODUCTS

vendor:d linkmodel:dcs-960lscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-20-1437

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: ZDI-20-1437
value: HIGH

Trust: 0.7

ZDI: ZDI-20-1437
baseSeverity: HIGH
baseScore: 8.8
vectorString: AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-20-1437

EXTERNAL IDS

db:ZDI_CANid:ZDI-CAN-11352

Trust: 0.7

db:ZDIid:ZDI-20-1437

Trust: 0.7

sources: ZDI: ZDI-20-1437

CREDITS

phieulang aka Hoang Le of VietSunShine Cyber Security Services

Trust: 0.7

sources: ZDI: ZDI-20-1437

SOURCES

db:ZDIid:ZDI-20-1437

LAST UPDATE DATE

2022-05-17T01:45:03.258000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-20-1437date:2021-09-27T00:00:00

SOURCES RELEASE DATE

db:ZDIid:ZDI-20-1437date:2020-12-15T00:00:00