Vulnerability Description
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices use the same hardcoded /etc/stunnel.key private key across different customers' installations, which allows remote attackers to defeat the HTTPS cryptographic protection mechanisms by leveraging knowledge of this key from another installation.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dir-850L Firmware | < fw114wwb07_h2ab |
| Dlink | Dir-850L | - |
Related Weaknesses (CWE)
References
- https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulneExploitThird Party Advisory
- https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulneExploitThird Party Advisory
FAQ
What is CVE-2017-14422?
CVE-2017-14422 is a vulnerability with a CVSS score of 7.5 (HIGH). D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices use the same hardcoded /etc/stunnel.key private key across different customer...
How severe is CVE-2017-14422?
CVE-2017-14422 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-14422?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dir-850L Firmware, Dlink Dir-850L.