Overview
ESET researchers recently reported that an industry-wide vulnerability named KrØØk could potentially affect devices with Broadcom Wi-Fi chips. D-Link is currently investigating the issue with Broadcom to understand the potential impact on D-Link devices. Meanwhile, we strongly advise D-Link device owners use encrypted connection methods such as HTTPS, SSH, or POP3S to minimize their risk of being hacked. We will provide updates as soon as we have more information.
An issue was discovered on Broadcom Wi-Fi client devices. Precisely timed and handcrafted traffic can cause internal errors (related to state transitions) in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic, a different vulnerability than CVE-2019-9500, CVE-2019-9501, CVE-2019-9502, and CVE-2019-9503.
D-Link takes the issues of network security and user privacy very seriously. We have a dedicated task force and product management team on call to address evolving security issues and implement appropriate security measures. Please check the D-Link website for updates regularly.
Disclosure
The vulnerability affects both WPA2-Personal and WPA2-Enterprise protocols, with AES-CCMP encryption.
NVD: https://nvd.nist.gov/vuln/detail/CVE-2019-15126
CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15126
Affected Models
Model |
Hardware Revision |
Affected FW |
Fixed FW |
Recommendation |
Last Updated |
DIR-868L |
All Ax Hardware Revisions |
v1.20b01 & Below |
v1.21b01_Beta |
Please Download and Upgrade |
04/28/2020 |
DIR-880L |
All Ax Hardware Revisions |
v1.20b02Beta & Below |
v1.21b01_Beta
|
Please Download and Upgrade |
05/19/2020 |
DIR-890L |
All Ax Hardware Revisions |
v1.21b02Beta & below |
v1.22b01_Beta |
Please Download and Upgrade |
06/12/2020 |
DWL-2600AP |
All Ax Hardware Revisions |
v4.2.0.17 & Below |
v4.2.0.17B002C |
Please Download and Upgrade |
04/16/2020 |
DWL-3600AP |
All Ax Hardware Revisions |
v4.2.0.15 & Below |
v4.2.0.15B003C |
Please Download and Upgrade |
04/16/2020 |
DWL-3610AP |
All Ax Hardware Revisions |
v4.6.2.0 & Below |
v4.6.2.1_Hotfix |
Please Download and Upgrade |
04/28/2020 |
DWL-6600AP |
All Ax Hardware Revisions |
v4.2.0.15 & Below |
v4.2.0.15B003C |
Please Download and Upgrade |
04/16/2020
|
DWL-6610AP |
All Ax Hardware Revisions |
v4.3.0.8 & Below |
v4.3.0.8B003C |
Please Download and Upgrade |
04/23/2020
|
DWL-6610AP |
All Bx Hardware Revisions |
v4.6.2.0 & Below |
v4.6.2.1_Hotfix |
Please Download and Upgrade |
04/28/2020 |
DWL-8600AP |
All Ax Hardware Revisions |
v4.3.0.2 & Below |
v4.3.0.2B018C
|
Please Download and Upgrade
|
04/23/2020
|
DWL-8610AP |
All Ax Hardware Revisions |
v4.3.0.10 & Below |
v4.3.0.10B022C |
Please Download and Upgrade |
04/23/2020 |
DWL-8710AP |
All Ax Hardware Revisions |
v4.5.0.1 & Below |
v4.5.0.8b009C |
Please Download and Upgrade |
04/23/2020 |
Regarding Security patch for your D-Link Devices
Firmware updates address the security vulnerabilities in affected D-Link devices. D-Link will update this continually, and we strongly recommend all users to install the relevant updates.
Please note that this is a device beta software, beta firmware, or hot-fix release, which is still undergoing final testing before its official release. The beta software, beta firmware, or hot-fix is provided on an “as is” and “as available” basis, and the user assumes all risk and liability for use thereof. D-Link does not offer any warranties, whether express or implied, as to the suitability or usability of the beta firmware. D-Link will not be liable for any loss, whether such loss is direct, indirect, special or consequential, suffered by any party as a result of their use of the beta firmware.
As there are different hardware revisions on our products, please check this on your device before downloading the correct corresponding firmware update. The hardware revision information can usually be found on the product label on the underside of the product next to the serial number. Alternatively, they can also be found on the device web configuration.