First published: Fri May 03 2024(Updated: )
D-Link D-View showUsers Improper Authorization Privilege Escalation Vulnerability. This vulnerability allows remote attackers to escalate privileges on affected installations of D-Link D-View. Authentication is required to exploit this vulnerability. The specific flaw exists within the showUsers method. The issue results from the lack of proper authorization before accessing a privileged endpoint. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user. . Was ZDI-CAN-19535.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link D-View |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-44410 has been classified as a high severity vulnerability due to its ability to allow privilege escalation.
To mitigate CVE-2023-44410, users should update D-Link D-View to the latest available version that addresses this vulnerability.
CVE-2023-44410 affects installations of D-Link D-View software.
CVE-2023-44410 can be exploited by remote attackers who have authenticated access to the affected D-Link D-View installations.
CVE-2023-44410 is classified as an improper authorization vulnerability that may lead to privilege escalation.