2024-12-08 03:06:42 +00:00

64 lines
2.1 KiB
JSON

{
"id": "CVE-2024-36755",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-27T21:15:15.700",
"lastModified": "2024-11-21T09:22:35.883",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "D-Link DIR-1950 up to v1.11B03 does not validate SSL certificates when requesting the latest firmware version and downloading URL. This can allow attackers to downgrade the firmware version or change the downloading URL via a man-in-the-middle attack."
},
{
"lang": "es",
"value": "D-Link DIR-1950 hasta v1.11B03 no valida los certificados SSL al solicitar la \u00faltima versi\u00f3n del firmware y la URL de descarga. Esto puede permitir a los atacantes degradar la versi\u00f3n del firmware o cambiar la URL de descarga mediante un ataque de intermediario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-599"
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10401",
"source": "cve@mitre.org"
},
{
"url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10401",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}