Skip to content

Commit

Permalink
20240410001-D-Link-Critical-Vulnerability (#624)
Browse files Browse the repository at this point in the history
* 20240221003-Apache-Dolphinscheduler-RCE-Vulnerability

* Format markdown files

* 20240221003-Apache-Dolphinscheduler-RCE-Vulnerability

* Format markdown files

* 20240221003-Apache-Dolphinscheduler-RCE-Vulnerability

* Format markdown files

* 20240221004-ConnectWise-Patches-Critical-ScreenConnect-Vulnerability

* Format markdown files

* Update 20240221004-ConnectWise-Patches-Critical-ScreenConnect-Vulnerability.md

Added update timestamps

* Format markdown files

* 20240221004-ConnectWise-Patches-Critical-ScreenConnect-Vulnerability

* Format markdown files

* Docker Container Runtime Component Vulnerabilities - 20240202002

* Format markdown files

* 20240214002-Microsoft-Releases-Multiple-Updates

* Format markdown files

* Microsoft Streaming Service Vulnerability Exploited - 20240212001

* Format markdown files

* Microsoft Releases Security Updates for Multiple Products - 20240214002

* Ivanti Multiple Vulnerabilities Added in CISA Known Exploits List - 20240111001

* Format markdown files

* 20240305003-TeamCity-Critical-Auth-Bypass-Vulnerability

* Format markdown files

* Apple Curl Overflow added to CISA Known Exploited Catalog - 20240123002

* Format markdown files

* Apple Curl Overflow added to CISA Known Exploited Catalog - 20240123002

* Format markdown files

* Microsoft Releases Security Updates for Multiple Products - 20240214002

* Format markdown files

* JetBrains TeamCity Vulnerability Added to CISAs Known Exploited Catalog - 20240305003

* Format markdown files

* 20240311001-Apple-Multiple-Products-Security-Advisory

* Format markdown files

* 20240307002-VMWare-releases-security-advisory-Multiple-Products

* Format markdown files

* 20240307001-known-exploited-Apple-zerodays

* Format markdown files

* 20240307002-VMWare-releases-security-advisory-Multiple-Products

* Format markdown files

* 20240307002-VMWare-releases-security-advisory-Multiple-Products

* Format markdown files

* 20240315003-CISA-Releases-Fifteen-Industrial-Control-Systems-Advisories

* Format markdown files

* 20240315001-Cisco-Security-Updates-March-2024

* Format markdown files

* 20240320001-Mozilla-Products-in-Could-Multiple-Vulnerabilities

* Format markdown files

* 20240320001-Mozilla-Security-Updates-For-Multiple-Products

* 20240320001-Mozilla-Security-Updates-For-Multiple-Products

* Format markdown files

* 20240320001-Mozilla-Security-Updates-For-Multiple-Products

* Format markdown files

* 20240318003-Fortinet-Critical-SQLi-Vulnerability-in-FortiClientEMS-Software

* Format markdown files

* 20231002006-PoC-Microsoft-Sharepoint-Server-Auth-Bypass

* Format markdown files

* (Test)20240328001-Apple-Security-Updates-for-Safari-and-macOS

* Format markdown files

* 20240402006-JetBrains-TeamCity-Cross-Site-Scripting-Vulnerability

* Format markdown files

* 20240402006-JetBrains-TeamCity-Cross-Site-Scripting-Vulnerability

* 20240209001-Ivanti-critical-patch-for-multiple-products

* Format markdown files

* 20240410002-Fortinet-Releases-Security-Updates-for-Multiple-Products

* Format markdown files

* 20240410001-D-Link-Critical-Vulnerability

* Format markdown files

---------

Co-authored-by: GitHub Actions <actions@github.com>
Co-authored-by: Joshua Hitchen (DGov) <86041569+DGovEnterprise@users.noreply.github.com>
  • Loading branch information
3 people authored Apr 12, 2024
1 parent 7fe6b2c commit 4b67618
Showing 1 changed file with 7 additions and 5 deletions.
12 changes: 7 additions & 5 deletions docs/advisories/20240410001-D-Link-Critical-Vulnerability.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# D-Link Critical Vulnerability - 20240410001
# D-Link Critical Vulnerabilities - 20240410001

## Overview

Expand All @@ -8,13 +8,14 @@ This exploitation could lead to arbitrary command execution on the affected D-Li

## What is vulnerable?

| CVE | Severity | CVSS | Product(s) Affected |
| --------------------------------------------------------------- | -------- | ------------- | -------------------------------------------------------------------------- |
| [CVE-2024-3273](https://nvd.nist.gov/vuln/detail/CVE-2024-3273) | N/A | Not yet rated | **DNS-320L**, **DNS-325**, **DNS-327L** **and** **DNS-340L upto 20240403** |
| CVE | Severity | CVSS | Product(s) Affected | Exploited | Dated |
| --------------------------------------------------------------- | -------- | ---- | -------------------------------------------------------------------------- | --------- | -------------- |
| [CVE-2024-3273](https://nvd.nist.gov/vuln/detail/CVE-2024-3273) | High | 7.3 | **DNS-320L**, **DNS-325**, **DNS-327L** **and** **DNS-340L upto 20240403** | Yes | 11 April, 2024 |
| [CVE-2024-3272](https://nvd.nist.gov/vuln/detail/CVE-2024-3272) | Critical | 9.8 | **DNS-320L**, **DNS-325**, **DNS-327L** **and** **DNS-340L upto 20240403** | Yes | 11 april, 2024 |

## What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.
CISA added this vulnerability in their [Known Exploited Vulnerabilities](https://www.cisa.gov/known-exploited-vulnerabilities-catalog) catalog. There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

## Recommendation

Expand All @@ -27,3 +28,4 @@ The WA SOC recommends administrators apply the solutions as per vendor instructi
- [Github - dlink](https://github.com/netsecfish/dlink)
- [VulDB](https://vuldb.com/?ctiid.259284)
- [Tenable](https://www.tenable.com/cve/CVE-2024-3273)
- [CISA](https://www.cisa.gov/news-events/alerts/2024/04/11/cisa-adds-two-known-exploited-vulnerabilities-catalog)

0 comments on commit 4b67618

Please sign in to comment.