First published: Fri Apr 21 2017(Updated: )
D-Link DAP-1353 H/W vers. B1 3.15 and earlier, D-Link DAP-2553 H/W ver. A1 1.31 and earlier, and D-Link DAP-3520 H/W ver. A1 1.16 and earlier reveal wireless passwords and administrative usernames and passwords over SNMP.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-link Dap-1353 H\/w B1 Firmware | =3.15 | |
Dlink Dap-1353 H\/w B1 | ||
D-link Dap-2553 H\/w A1 Firmware | =1.31 | |
Dlink Dap-2553 H\/w A1 | ||
D-link Dap-3520 H\/w A1 Firmware | =1.16 | |
Dlink Dap-3520 H\/w A1 |
http://www.dlink.com/mk/mk/support/support-news/2016/march/16/firmadyne-cve_2016_1558-cve_2016_1559
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1559 is categorized as a high-severity vulnerability due to the exposure of sensitive information such as wireless passwords and administrative credentials.
To fix CVE-2016-1559, upgrade the affected D-Link devices to the latest firmware versions that have addressed this vulnerability.
CVE-2016-1559 affects D-Link DAP-1353 (H/W ver. B1 3.15 and earlier), DAP-2553 (H/W ver. A1 1.31 and earlier), and DAP-3520 (H/W ver. A1 1.16 and earlier).
CVE-2016-1559 exposes wireless passwords along with administrative usernames and passwords via SNMP.
While upgrading firmware is the primary solution, disabling SNMP on the affected devices can serve as a temporary workaround for CVE-2016-1559.