First published: Wed Sep 13 2017(Updated: )
The D-Link NPAPI extension, as used on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-850L firmware | <=fw114wwb07_h2ab | |
D-Link DIR-850L Firmware | ||
D-Link DIR-850L firmware | <=fw208wwb02 | |
dlink DIR-850L firmware | <=fw114wwb07_h2ab_beta1 | |
dlink DIR-850L firmware | <=fw208wwb02 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14420 is considered a high severity vulnerability due to the potential for man-in-the-middle attacks.
To fix CVE-2017-14420, you should update the firmware of your D-Link DIR-850L devices to the latest version available.
CVE-2017-14420 affects D-Link DIR-850L REV. A and REV. B devices with specific vulnerable firmware versions.
The impact of CVE-2017-14420 includes the ability for attackers to spoof SSL servers and potentially intercept sensitive information.
Yes, CVE-2017-14420 can be exploited remotely, allowing attackers to conduct man-in-the-middle attacks without physical access.