var-201807-0343
Vulnerability from variot

An issue was discovered on D-Link DIR-890L with firmware 1.21B02beta01 and earlier, DIR-885L/R with firmware 1.21B03beta01 and earlier, and DIR-895L/R with firmware 1.21B04beta04 and earlier devices (all hardware revisions). Due to the predictability of the /docs/captcha_(number).jpeg URI, being local to the network, but unauthenticated to the administrator's panel, an attacker can disclose the CAPTCHAs used by the access point and can elect to load the CAPTCHA of their choosing, leading to unauthorized login attempts to the access point. D-Link DIR-890L A2 The device contains an access control vulnerability.Information may be tampered with. D-LinkDIR-890L is a wireless router product of D-Link. D-LinkDIR-890LA2 has an improper access control vulnerability. Authorized login attempts the access point. A security vulnerability exists in the D-Link DIR-890L A2. [Suggested description] An issue was discovered on D-Link DIR-890L A2 devices.

[Has vendor confirmed or acknowledged the vulnerability?] true

[Discoverer] Kevin Randall

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "dir-890l a2",
        "scope": null,
        "trust": 1.4,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dir-885l\\/r",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "d link",
        "version": "1.21b03beta01"
      },
      {
        "_id": null,
        "model": "dir-890l",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.21b02beta01"
      },
      {
        "_id": null,
        "model": "dir-895l\\/r",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "d link",
        "version": "1.21b04beta01"
      },
      {
        "_id": null,
        "model": "dir-890l a2",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-12491"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-007682"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-320"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-12103"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:d-link:dir-890l_a2_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-007682"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "Kevin Randall",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "148393"
      }
    ],
    "trust": 0.1
  },
  "cve": "CVE-2018-12103",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 6.5,
            "id": "CVE-2018-12103",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "LOW",
            "trust": 1.8,
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.9,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2018-12491",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 6.5,
            "id": "VHN-122029",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:A/AC:L/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 2.8,
            "id": "CVE-2018-12103",
            "impactScore": 3.6,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-12103",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2018-12103",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-12491",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201807-320",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-122029",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-12491"
      },
      {
        "db": "VULHUB",
        "id": "VHN-122029"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-007682"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-320"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-12103"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "An issue was discovered on D-Link DIR-890L with firmware 1.21B02beta01 and earlier, DIR-885L/R with firmware 1.21B03beta01 and earlier, and DIR-895L/R with firmware 1.21B04beta04 and earlier devices (all hardware revisions). Due to the predictability of the /docs/captcha_(number).jpeg URI, being local to the network, but unauthenticated to the administrator\u0027s panel, an attacker can disclose the CAPTCHAs used by the access point and can elect to load the CAPTCHA of their choosing, leading to unauthorized login attempts to the access point. D-Link DIR-890L A2 The device contains an access control vulnerability.Information may be tampered with. D-LinkDIR-890L is a wireless router product of D-Link. D-LinkDIR-890LA2 has an improper access control vulnerability. Authorized login attempts the access point. A security vulnerability exists in the D-Link DIR-890L A2. [Suggested description]\nAn issue was discovered on D-Link DIR-890L A2 devices. \n\n------------------------------------------\n\n[Has vendor confirmed or acknowledged the vulnerability?]\ntrue\n\n------------------------------------------\n\n[Discoverer]\nKevin Randall\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-12103"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-007682"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-12491"
      },
      {
        "db": "VULHUB",
        "id": "VHN-122029"
      },
      {
        "db": "PACKETSTORM",
        "id": "148393"
      }
    ],
    "trust": 2.34
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-12103",
        "trust": 3.2
      },
      {
        "db": "DLINK",
        "id": "SAP10099",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-007682",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-320",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-12491",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "148393",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-122029",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-12491"
      },
      {
        "db": "VULHUB",
        "id": "VHN-122029"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-007682"
      },
      {
        "db": "PACKETSTORM",
        "id": "148393"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-320"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-12103"
      }
    ]
  },
  "id": "VAR-201807-0343",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-12491"
      },
      {
        "db": "VULHUB",
        "id": "VHN-122029"
      }
    ],
    "trust": 1.3383928649999999
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "ICS",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-12491"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:52:02.919000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://us.dlink.com/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-007682"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-863",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-284",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-122029"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-007682"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-12103"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 3.1,
        "url": "http://seclists.org/fulldisclosure/2018/jul/13"
      },
      {
        "trust": 1.7,
        "url": "https://securityadvisories.dlink.com/announcement/publication.aspx?name=sap10099"
      },
      {
        "trust": 0.9,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12103"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-12103"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-12491"
      },
      {
        "db": "VULHUB",
        "id": "VHN-122029"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-007682"
      },
      {
        "db": "PACKETSTORM",
        "id": "148393"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-320"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-12103"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-12491",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-122029",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-007682",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "148393",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-320",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2018-12103",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-07-04T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-12491",
        "ident": null
      },
      {
        "date": "2018-07-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-122029",
        "ident": null
      },
      {
        "date": "2018-09-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-007682",
        "ident": null
      },
      {
        "date": "2018-07-02T19:48:01",
        "db": "PACKETSTORM",
        "id": "148393",
        "ident": null
      },
      {
        "date": "2018-07-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201807-320",
        "ident": null
      },
      {
        "date": "2018-07-05T20:29:00.433000",
        "db": "NVD",
        "id": "CVE-2018-12103",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-07-04T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-12491",
        "ident": null
      },
      {
        "date": "2019-10-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-122029",
        "ident": null
      },
      {
        "date": "2018-09-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-007682",
        "ident": null
      },
      {
        "date": "2019-10-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201807-320",
        "ident": null
      },
      {
        "date": "2024-11-21T03:44:36.390000",
        "db": "NVD",
        "id": "CVE-2018-12103",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "remote or local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-320"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "D-Link DIR-890L A2 Device access control vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-007682"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "access control error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-320"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.