First published: Sun Jul 21 2024(Updated: )
D-Link - CWE-288:Authentication Bypass Using an Alternate Path or Channel
Credit: cna@cyber.gov.il
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Dlink DSL-225 | =bz_1.00.16 | |
Dlink DSL-225 Firmware |
The product is EOL. The Vendor recommends these devices be retired and replaced.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38437 has been categorized as a high severity vulnerability due to its potential for authentication bypass.
To mitigate CVE-2024-38437, upgrade the D-Link DSL-225 firmware to the latest version provided by the manufacturer.
The D-Link DSL-225 with firmware version bz_1.00.16 is specifically affected by CVE-2024-38437.
CVE-2024-38437 can facilitate unauthorized access to systems by exploiting authentication bypass vulnerabilities.
Yes, CVE-2024-38437 has been publicly disclosed by MITRE as part of their cybersecurity advisory.