Advisory Details

December 15th, 2020

(0Day) D-Link DCS-960L HNAP LoginPassword Incorrect Implementation of Authentication Algorithm Authentication Bypass Vulnerability

ZDI-20-1437
ZDI-CAN-11352

CVE ID
CVSS SCORE 8.8, AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS D-Link
AFFECTED PRODUCTS DCS-960L
VULNERABILITY DETAILS

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DCS-960L Wi-Fi cameras. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the handling of HNAP login requests. The issue results from improper implementation of the authentication algorithm. An attacker can leverage this vulnerability to bypass authentication and execute code in the context of the device.

ADDITIONAL DETAILS

This vulnerability is being disclosed publicly without a patch in accordance with the ZDI 120 day deadline.

07/20/20 - ZDI reported the vulnerability to D-Link
10/16/20 - ZDI requested a status update
12/09/20 - ZDI notified D-Link of the intention to publish the report as 0-day advisory on 12/15/2020

-- Mitigation:
Given the nature of the vulnerability the only salient mitigation strategy is to restrict interaction with the application.


DISCLOSURE TIMELINE
  • 2020-07-20 - Vulnerability reported to vendor
  • 2020-12-15 - Coordinated public release of advisory
  • 2021-09-27 - Advisory Updated
CREDIT phieulang aka Hoang Le of VietSunShine Cyber Security Services
BACK TO ADVISORIES