製品・ソフトウェアに関する情報
D-Link DIR-615 における認証に関する脆弱性
Title D-Link DIR-615 における認証に関する脆弱性
Summary

D-Link DIR-615 には、認証に関する脆弱性が存在します。

Possible impacts 情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。
Solution

ベンダ情報および参考情報を参照して適切な対策を実施してください。

Publication Date June 20, 2017, midnight
Registration Date Aug. 2, 2017, 4:41 p.m.
Last Update Aug. 2, 2017, 4:41 p.m.
CVSS3.0 : 緊急
Score 9.8
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS2.0 : 危険
Score 7.5
Vector AV:N/AC:L/Au:N/C:P/I:P/A:P
Affected System
D-Link Systems, Inc.
DIR-615 20.12PTb04 未満
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
0 [2017年08月02日]
  掲載
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2017-7405
Summary

On the D-Link DIR-615 before v20.12PTb04, once authenticated, this device identifies the user based on the IP address of his machine. By spoofing the IP address belonging to the victim's host, an attacker might be able to take over the administrative session without being prompted for authentication credentials. An attacker can get the victim's and router's IP addresses by simply sniffing the network traffic. Moreover, if the victim has web access enabled on his router and is accessing the web interface from a different network that is behind the NAT/Proxy, an attacker can sniff the network traffic to know the public IP address of the victim's router and take over his session as he won't be prompted for credentials.

Publication Date July 7, 2017, 9:29 p.m.
Registration Date Jan. 26, 2021, 1:28 p.m.
Last Update Nov. 21, 2024, 12:31 p.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:o:dlink:dir-615:*:*:*:*:*:*:*:* 20.12ptb01
execution environment
1 cpe:2.3:h:dlink:dir-615:*:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List