Published: April 9, 2024
Overview
A command injection vulnerability and a backdoor account have been discovered in D-Link NAS devices DNS-340L, DNS-320L, DNS-327L, and DNS-325, among others. Attackers are able to compromise a large number of devices that are in need of immediate attention.
Impact
Attackers will be able to get unauthorized access to devices without proper authentication due to the presence of the backdoor. The attacker will also be able to execute arbitrary commands on the system.
Applicable Versions
Affected Versions | Not Affected Versions |
---|---|
DNS-320L Version 1.11, Version 1.03.0904.2013, Version 1.01.0702.2013 DNS-325 Version 1.01 DNS-327L Version 1.09, Version 1.00.0409.2013 DNS-340L Version 1.08 | These products have reached EOL/EOS and you must contact D-Link support. |
Mitigations and Workarounds
Since the DNS-320L, DNS-325, DNS 327L and DNS-340 have reached end of life and end of support, you must contact D-Link support to get a solution.
Best Practices
Install security updates for all the devices in the network. Upgrade or replace the systems before end of support.
Netsurion Detection and Response
Netsurion’s vulnerability management system is working with the vendors to update the vulnerability scanners to detect for customers who have subscribed to Netsurion Vulnerability Management.
References: