First published: Fri May 03 2024(Updated: )
D-Link D-View Use of Hard-coded Cryptographic Key Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of D-Link D-View. Authentication is not required to exploit this vulnerability. The specific flaw exists within the TokenUtils class. The issue results from a hard-coded cryptographic key. An attacker can leverage this vulnerability to bypass authentication on the system. . Was ZDI-CAN-19659.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link D-View |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32169 is classified as a critical vulnerability due to its potential for remote authentication bypass.
To mitigate CVE-2023-32169, users should apply the latest security updates and patches provided by D-Link for D-View products.
CVE-2023-32169 affects installations of D-Link D-View that are susceptible to remote authentication bypass.
CVE-2023-32169 allows attackers to bypass authentication without needing any credentials.
No, authentication is not required to exploit CVE-2023-32169, making it particularly dangerous.