CVE-2024-3272

9.8 CRITICAL

📋 TL;DR

This vulnerability in D-Link network storage devices allows remote attackers to access hard-coded credentials via HTTP GET requests to the nas_sharing.cgi endpoint. Attackers can gain unauthorized access to affected devices, potentially compromising stored data and network security. Only end-of-life D-Link DNS models are affected, with no vendor support available.

💻 Affected Systems

Products:
  • D-Link DNS-320L
  • DNS-325
  • DNS-327L
  • DNS-340L
Versions: All versions up to April 3, 2024
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All affected products are end-of-life with no vendor support. Vulnerability exists in default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to data theft, ransomware deployment, and use as pivot point for internal network attacks.

🟠

Likely Case

Unauthorized access to stored files, configuration tampering, and credential harvesting from the compromised device.

🟢

If Mitigated

Limited impact if devices are isolated in separate network segments with strict access controls.

🌐 Internet-Facing: HIGH - Exploit requires only HTTP access and has public proof-of-concept available.
🏢 Internal Only: HIGH - Attack can be launched from any network segment with device access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available on GitHub. Attack requires only HTTP access to the vulnerable endpoint with specific parameter manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None available

Vendor Advisory: https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383

Restart Required: No

Instructions:

No official patch exists. Vendor confirms products are end-of-life and recommends replacement.

🔧 Temporary Workarounds

Network Isolation

all

Place affected devices in isolated VLAN with strict firewall rules blocking external and unnecessary internal access.

HTTP Access Restriction

all

Block access to port 80/443 on affected devices except from authorized management stations.

🧯 If You Can't Patch

  • Immediately disconnect affected devices from networks and replace with supported hardware
  • If temporary use required, place behind VPN with strict access controls and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Test HTTP GET request to /cgi-bin/nas_sharing.cgi?user=messagebus on device IP. If response contains credentials or device information, it's vulnerable.

Check Version:

Check device web interface or SSH to device and check firmware version in settings.

Verify Fix Applied:

No fix available to verify. Only verification is device replacement.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /cgi-bin/nas_sharing.cgi with user=messagebus parameter
  • Unusual authentication attempts or configuration changes

Network Indicators:

  • HTTP traffic to port 80/443 of D-Link DNS devices with specific parameter patterns
  • Outbound connections from DNS devices to unknown IPs

SIEM Query:

source_ip="DNS_DEVICE_IP" AND (url_path="/cgi-bin/nas_sharing.cgi" AND query_string CONTAINS "user=messagebus")

🔗 References

📤 Share & Export