Skip to content

Commit

Permalink
Revert "20240410001-D-Link-Critical-Vulnerability (#624)"
Browse files Browse the repository at this point in the history
This reverts commit 4b67618.
  • Loading branch information
DGovEnterprise authored Apr 12, 2024
1 parent 01c3f28 commit 80b90d9
Showing 1 changed file with 5 additions and 7 deletions.
12 changes: 5 additions & 7 deletions docs/advisories/20240410001-D-Link-Critical-Vulnerability.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# D-Link Critical Vulnerabilities - 20240410001
# D-Link Critical Vulnerability - 20240410001

## Overview

Expand All @@ -8,14 +8,13 @@ This exploitation could lead to arbitrary command execution on the affected D-Li

## What is vulnerable?

| CVE | Severity | CVSS | Product(s) Affected | Exploited | Dated |
| --------------------------------------------------------------- | -------- | ---- | -------------------------------------------------------------------------- | --------- | -------------- |
| [CVE-2024-3273](https://nvd.nist.gov/vuln/detail/CVE-2024-3273) | High | 7.3 | **DNS-320L**, **DNS-325**, **DNS-327L** **and** **DNS-340L upto 20240403** | Yes | 11 April, 2024 |
| [CVE-2024-3272](https://nvd.nist.gov/vuln/detail/CVE-2024-3272) | Critical | 9.8 | **DNS-320L**, **DNS-325**, **DNS-327L** **and** **DNS-340L upto 20240403** | Yes | 11 april, 2024 |
| CVE | Severity | CVSS | Product(s) Affected |
| --------------------------------------------------------------- | -------- | ------------- | -------------------------------------------------------------------------- |
| [CVE-2024-3273](https://nvd.nist.gov/vuln/detail/CVE-2024-3273) | N/A | Not yet rated | **DNS-320L**, **DNS-325**, **DNS-327L** **and** **DNS-340L upto 20240403** |

## What has been observed?

CISA added this vulnerability in their [Known Exploited Vulnerabilities](https://www.cisa.gov/known-exploited-vulnerabilities-catalog) catalog. There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.
There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

## Recommendation

Expand All @@ -28,4 +27,3 @@ The WA SOC recommends administrators apply the solutions as per vendor instructi
- [Github - dlink](https://github.com/netsecfish/dlink)
- [VulDB](https://vuldb.com/?ctiid.259284)
- [Tenable](https://www.tenable.com/cve/CVE-2024-3273)
- [CISA](https://www.cisa.gov/news-events/alerts/2024/04/11/cisa-adds-two-known-exploited-vulnerabilities-catalog)

0 comments on commit 80b90d9

Please sign in to comment.