• Home Support Forums Security Advisories Shop     English | French
Security Announcement
Announcement > SAP10398
E15 / E30 / G403 / G415 / G416 / M15 / M18 / M30 / M32 / M60 / R03 / R04 / R12 / R15 / R18 / R32 :: H/W Rev. Ax :: TWCERT Reports :: (CVE-2024-6044) LAN-Side arbitrary file reading and (CVE-2024-6045) elevated unauthenticated access attack vectors
Publication ID: SAP10398
Resolved Status: Yes
Published on: 31 May 2024 1:42 GMT
Last updated on: 19 June 2024 1:51 GMT

 

Overview

 

The EAGLE PRO AI Family (hardware rev. Ax) Models E15 / G403 / G415 / G416 / M15 / M18 / M32 / R03 / R04 / R12 / R15 / R18 / R32 and AQUILA PRO AI Family (hardware rev. Ax) Model E30 / M30 / M60 were reported to D-Link by TWCERT in April 2024 as having multiple vulnerabilities. D-Link Corporation immediately verified the reports and began mitigation, and the affected models are listed below.

 

D-Link has released fixes for these vulnerabilities, automatically updating the devices. Owners can use their D-Link Device Mobile applications to check and trigger updates manually.

 

3rd Party Report information

 

·         Reports provided: TW CERT::  Link

Exploit 1: TW CERT: CVE-2024-6044 / TVN-202406012

 

- CVSS 6.5 (Medium) CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

- CWE CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

- CAPEC : CAPEC-126: Path Traversal

 

LAN-Side Arbitrary File Reading: The affected devices have an unauthenticated path traversal vulnerability. Unauthenticated attackers on the same network can read arbitrary system files. 

 

Exploit 2: TW CERT: CVE-2024-6045 / TVN-202406013

                    

- CVSS8.8 (High) CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 

- CWECWE-912: Hidden Functionality, CWE-798: Use of Hard-coded Credentials

- CAPECCAPEC-190: Reverse Engineer an Executable to Expose Assumed Hidden Functionality

 

LAN-Side Unauthenticated Access to Management Features: Unauthenticated attackers on the same network can force the device to enable telnet service by accessing a specific URL and can log in using the hardcoded credentials obtained from reverse engineering and analyzing the firmware

 

Affected Models

 

   Model

Region

Hardware Revision

Affected

Fixed F/W

Recommendation

 Last Updated

E15

Worldwide

All H/W Revs.

Yes: 1 & 2

v1.20.01

Automatic Forced Update **

06/16/2024

E30

Worldwide

All H/W Revs.

Yes: 1 & 2

v1.10.02

Automatic Forced Update **

06/16/2024

G403

Non-US

All H/W Revs.

Yes: 1 & 2

v1.10.01

Automatic Forced Update **

06/16/2024

G415

Non-US

All H/W Revs.

Yes: 1 & 2

v1.10.01

Automatic Forced Update **

06/16/2024

G416

Non-US

All H/W Revs.

Yes: 1 & 2

v1.10.01

Automatic Forced Update **

06/16/2024

M15

Worldwide

All H/W Revs. Including /2 & /3 Kits

Yes: 1 & 2

v1.20.01 & v1.21.01

Automatic Forced Update **

06/16/2024

M18

Worldwide

All H/W Revs. Including /2 & /3 Kits

Yes: 1 & 2

v1.10.01

Automatic Forced Update **

06/16/2024

M32

Worldwide

All H/W Revs. Including /2 & /3 Kits

Yes: 1 & 2

v1.10.02

Automatic Forced Update **

06/16/2024

R03

Non-US

All H/W Revs.

Yes: 1 & 2

v1.10.01

Automatic Forced Update **

06/16/2024

R04

Non-US

All H/W Revs.

Yes: 1 & 2

v1.10.01

Automatic Forced Update **

06/16/2024

R12

Worldwide

All H/W Revs.

Yes: 1 & 2

v1.10.01

Automatic Forced Update **

06/16/2024

R15

Worldwide

All H/W Revs. Including /2 & /3 Kits

Yes: 1 & 2

v1.20.01

Automatic Forced Update **

06/16/2024

R18

Non-US

All H/W Revs.

Yes: 1 & 2

v1.10.01

Automatic Forced Update **

06/16/2024

R32

Worldwide

All H/W Revs. Including /2 & /3 Kits

Yes: 1 & 2

v1.10.02

Automatic Forced Update **

06/16/2024

M30

Worldwide

All H/W Revs. Including /2 & /3 Kits

Yes: 1 & 2

v1.10.02

Automatic Forced Update **

06/16/2024

M60

Worldwide

All H/W Revs. Including /2 & /3 Kits

Yes: 1 & 2

v1.10.02

Automatic Forced Update **

06/16/2024

 

Regarding the Security Update for Your D-Link Device

 

Installing firmware updates is critical in addressing security vulnerabilities in your D-Link devices. D-Link strongly urges all users to install the relevant updates and regularly check for further updates. After downloading the firmware update, it is essential to ALWAYS validate its success by comparing the firmware version on your product interface to the firmware update version.

 

Please note that beta software, beta firmware, or a hot-fix release is still undergoing rigorous testing before its official release. This ensures that the software is of the highest quality and meets our stringent standards. However, it is essential to understand that the user assumes all risk and liability for its use. D-Link does not provide express or implied warranties regarding the suitability or usability of the beta software, beta firmware, or hot-fix release. D-Link will not be liable for any direct, indirect, special, or consequential loss suffered by any party due to their use of the beta firmware, beta software, or hit-fix release.

 

NOTE: Our products have different hardware revisions, so please check your device’s hardware revision before downloading the corresponding firmware update. The hardware revision can be found on the product label next to the serial number or on the device's web interface.

 

**In the Event Automatic Forced Update Fails to new firmware

 

As this is a critical and required firmware update, if your D-Link Mobile Application does not report the fixed firmware version or newer, you can manually download the patched updates on 06/17/2024 and upload the firmware to the device's web GUI.

 

The link to firmware updates is https://support.dlink.com/; search for your model. If you require help with a manual update, this page also has links for Customer Care Help.