• Home Support Forums Security Advisories Shop     English | French
Security Announcement
Announcement > SAP10050
DAP-1320 - Rev Ax - Command Injection - FW 1.11
Publication ID: SAP10050
Resolved Status: Yes
Published on: 12 February 2015 10:02 GMT
Last updated on: 20 March 2015 4:10 GMT

Overview


D-Link has received a report that an attacker who is able to intercept and modify the DAP-1320's traffic while a user is checking for new firmware through the web UI will be able to inject commends in the server's response.  Injected commands will be executed if the user attempts to update the DAP-1320's firmware through the provided dialog.


References

 

Allen Harper - Tangible Security - disclosures@TangibleSecurity.com - Link

CERT Vulnerability ID :: VU#184100

NIST Vulnerability ID :: CVE-2015-2050

 



Details


When the DSP-1320 checks for the availability of new firmware, it pulls an XML file from a D-Link server.

If an attacker is able to intercept and modify that request, the XML file that is returned could been modified by an attacker to indicate that an updated firmware is available, and to include an injected command in place of the firmware's download location.

The user would then be presented with a dialog indicating that new firmware is available for their DAP-1320.

If the user instructs the DAP-1320 to upgrade to that version using the dialog on the DAP-1320, the attacker's command will be executed.

If the attacker has local network access and is able to authenticate to the DAP-1320, they could perform this attack without assistance from a legitimate user.


Affected Product

 

Model Name

HW Version

Vulnerable FW Versions

Current FW Versions   (include fixes)

DAP-1320 Ax

v. 1.10 and Before

Current Firmware :: v1.21b05

Patched Firmware :: v1.21b01



 
Security patch for your D-Link Devices

 
These firmware updates address the security vulnerabilities in affected D-Link devices. D-Link will update this continually and we strongly recommend all users to install the relevant updates.
 
As there are different hardware revisions on our products, please check this on your device before downloading the correct corresponding firmware update. The hardware revision information can usually be found on the product label on the underside of the product next to the serial number. Alternatively, they can also be found on the device web configuration.