First published: Thu Aug 01 2019(Updated: )
An issue was discovered on D-Link 6600-AP, DWL-3600AP, and DWL-8610AP Ax 4.2.0.14 21/03/2019 devices. There is post-authenticated Certificate and RSA Private Key extraction through an insecure sslcert-get.cgi HTTP command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link 6600-AP Firmware | =4.2.0.14 | |
D-Link DAP-6600 | ||
D-Link DWL-3600AP Firmware | =4.2.0.14 | |
Dlink DWL-3600AP Firmware | ||
Dlink Dwl-8610ap | =4.2.0.14 | |
Dlink Dwl-8610ap Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14334 is considered a critical vulnerability due to its ability to allow post-authenticated certificate and RSA private key extraction.
To fix CVE-2019-14334, update the firmware of affected D-Link devices to a version that is not vulnerable.
CVE-2019-14334 affects D-Link 6600-AP, DWL-3600AP, and DWL-8610AP devices running firmware version 4.2.0.14.
CVE-2019-14334 involves the exploitation of an insecure HTTP command that allows unauthorized access to sensitive SSL certificates and private keys.
Yes, CVE-2019-14334 can be exploited remotely after authentication to the device.