First published: Sun Jul 21 2024(Updated: )
D-Link - CWE-294: Authentication Bypass by Capture-replay
Credit: cna@cyber.gov.il
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Dlink DSL-225 | =gem_1.00.02 | |
Dlink DSL-225 Firmware |
The product is EOL. The Vendor recommends these devices be retired and replaced.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38438 is rated as a high severity vulnerability due to its potential for authentication bypass.
To fix CVE-2024-38438, update the D-Link DSL-225 to the latest firmware version that addresses this vulnerability.
CVE-2024-38438 affects the D-Link DSL-225 with firmware version gem_1.00.02.
CVE-2024-38438 is classified as an authentication bypass vulnerability using capture-replay techniques.
Yes, CVE-2024-38438 can potentially be exploited remotely, making it critical to address promptly.