CVE-2023-7163

10.0 CRITICAL

📋 TL;DR

This critical vulnerability in D-Link D-View 8 allows attackers to manipulate the probe inventory, potentially leading to information disclosure from other probes, denial of service by filling the inventory, or executing unauthorized tasks on other probes. It affects D-View 8 v2.0.2.89 and earlier versions. Organizations using these vulnerable D-View deployments are at risk.

💻 Affected Systems

Products:
  • D-Link D-View 8
Versions: v2.0.2.89 and prior
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the D-View service component specifically. The vulnerability is present in default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of the D-View management system allowing attackers to execute arbitrary tasks on all managed probes, steal sensitive monitoring data, and cause widespread denial of service across the monitored infrastructure.

🟠

Likely Case

Information disclosure from probes and denial of service conditions as attackers manipulate the probe inventory to disrupt monitoring operations.

🟢

If Mitigated

Limited impact if network segmentation prevents external access and proper authentication controls are in place, though internal threats remain.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Based on the CVSS score and description, exploitation appears straightforward without authentication requirements.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.0.2.90 or later

Vendor Advisory: https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10365

Restart Required: Yes

Instructions:

1. Download the latest D-View 8 version from D-Link's official website. 2. Backup current configuration and data. 3. Run the installer to upgrade to v2.0.2.90 or later. 4. Restart the D-View service and verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to the D-View service to only trusted management networks.

Firewall Rules

all

Implement firewall rules to block external access to D-View service ports.

🧯 If You Can't Patch

  • Isolate the D-View server from internet access and restrict to internal management networks only.
  • Implement strict network monitoring and alerting for any unusual probe inventory manipulation attempts.

🔍 How to Verify

Check if Vulnerable:

Check the D-View version in the web interface or via the installed program details in Windows. If version is 2.0.2.89 or earlier, the system is vulnerable.

Check Version:

Check via D-View web interface: Login > Help > About, or check Windows Programs and Features for version.

Verify Fix Applied:

After patching, verify the version shows 2.0.2.90 or later in the D-View interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual probe inventory modifications
  • Failed authentication attempts to D-View service
  • Unexpected task executions on probes

Network Indicators:

  • Unusual traffic to D-View service ports (default 80/443)
  • External IP addresses accessing D-View management interface

SIEM Query:

source="d-view.log" AND (event="probe_inventory_modification" OR event="unauthorized_access")

🔗 References

📤 Share & Export