First published: Tue Aug 27 2019(Updated: )
D-link DIR-825AC G1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. They forward ARP requests, which are sent as broadcast packets, between the host and the guest networks. To use this leakage as a direct covert channel, the sender can trivially issue an ARP request to an arbitrary computer on the network. (In general, some routers restrict ARP forwarding only to requests destined for the network's subnet mask, but these routers did not restrict this traffic in any way. Depending on this factor, one must use either the lower 8 bits of the IP address, or the entire 32 bits, as the data payload.)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-825/AC G1 Firmware | ||
Dlink Dir-825/ac G1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13265 is considered a moderate severity vulnerability due to its potential for unauthorized access between networks.
To fix CVE-2019-13265, ensure that your device firmware is updated to the latest version provided by D-Link.
Users of D-Link DIR-825AC G1 devices running vulnerable firmware versions are affected by CVE-2019-13265.
The impact of CVE-2019-13265 includes the potential leakage of data between guest and host networks due to insufficient compartmentalization.
Yes, CVE-2019-13265 poses a network security risk as it allows possible unauthorized access and data interception between segregated networks.