D-Link Enterprise > DGS-1510-Series

Security Update: Authentication Bypass Vulnerabilities - Dlink 1510 Switch Serie

(1/1)

varangamin:
Authentication Bypass Vulnerabilities - Dlink 1510 Switch Series

Disclosed by Aditya K Sood and Varang Amin (Independent Security Researchers)

Drink switches are ****e to authentication bypass vulnerabilities which allow the remote users to perform unauthorized operations on the switches thereby resulting in complete control of the switch.

With the authentication bypass, it is possible to:


* execute remote commands on the switch such as becoming administrator.
extract information from the switch such as configuration and others.

Dlink has released a patch here: http://forums.dlink.com/index.php?topic=66410.0

We also want to highlight that DLink security team worked collaboratively with us to fix the issue within a month including re-testing and releasing the firmware update. The DLink team was very active in communicating with the researchers. In addition, they created a testing environment with the new fixes for us to test the updated firmware.

If you have any specific questions, feel free to let us know.

Thanks

Navigation

[0] Message Index

Go to full version