First published: Wed Sep 13 2017(Updated: )
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices use the same hardcoded /etc/stunnel.key private key across different customers' installations, which allows remote attackers to defeat the HTTPS cryptographic protection mechanisms by leveraging knowledge of this key from another installation.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
dlink DIR-850L firmware | <=fw114wwb07_h2ab | |
D-Link DIR-850L Firmware | ||
dlink DIR-850L firmware | <=fw208wwb02 | |
D-Link DIR-850L Firmware | <fw114wwb07_h2ab | |
D-Link DIR-850L Firmware | =fw114wwb07_h2ab-beta1 | |
D-Link DIR-850L Firmware | <=fw208wwb02 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14422 has a moderate severity rating due to its potential to undermine the HTTPS encryption of affected D-Link DIR-850L devices.
To address CVE-2017-14422, update your D-Link DIR-850L firmware to versions that are not vulnerable, specifically those beyond FW114WWb07_h2ab or FW208WWb02.
CVE-2017-14422 affects D-Link DIR-850L Rev. A and Rev. B devices running specific vulnerable firmware versions.
The implications of CVE-2017-14422 include the risk of remote attackers intercepting sensitive communications due to the use of a hardcoded private key.
CVE-2017-14422 was discovered in September 2017, highlighting a significant security flaw in certain D-Link router firmware.