Data: CASIE
Negative Trigger
from
security
researchers
involving
the
company
’
s
routers
.
The
latest
incident
arose
after
Silesian
University
of
Technology
researcher
Błazej
Adamczyk
contacted
Vulnerability-related.DiscoverVulnerability
D-Link
last
May
about
three
vulnerabilities
affecting
Vulnerability-related.DiscoverVulnerability
eight
router
models
.
Following
the warning
Vulnerability-related.DiscoverVulnerability
,
D-Link
patched
Vulnerability-related.PatchVulnerability
two
of
the
affected
routers
,
but
did
not
initially
reveal
Vulnerability-related.DiscoverVulnerability
how
it
would
proceed
for
the
remaining
six
models
.
After
further
prompting
Vulnerability-related.DiscoverVulnerability
from
Adamczyk
,
D-Link
revealed
Vulnerability-related.DiscoverVulnerability
that
the
remaining
six
routers
would not get
Vulnerability-related.PatchVulnerability
a
security
patch
because
they
were
considered
end-of-life
models
,
leaving
affected
owners
out
in
the
cold
.
“
The
D-Link
models
affected
Vulnerability-related.DiscoverVulnerability
are
the
DWR-116
,
DWR-140L
,
DWR-512
,
DWR-640L
,
DWR-712
,
DWR-912
,
DWR-921
,
and
DWR-111
,
six
of
which
date
from
2013
,
with
the
DIR-640L
first appearing
Vulnerability-related.DiscoverVulnerability
in
2012
and
the
DWR-111
in
2014
,
”
Naked
Security
reported
.
Though
these
are
not
current
models
in
D-Link
’
s
portfolio
,
many
of
the
listed
models
are
still
likely
to
be
in
use
.
As
a
result
of
this
impasse
,
Adamczyk
released details
Vulnerability-related.DiscoverVulnerability
about
the
security
flaws
,
following
responsible
security
protocols
after
giving
D-Link
notice
and
the
opportunity
to
address
Vulnerability-related.PatchVulnerability
the
issues
.
Of
significance
is
that
this
is
the
second
time
in
about
a
year
that
D-Link
has failed to address
Vulnerability-related.PatchVulnerability
security
vulnerabilities
affecting
Vulnerability-related.DiscoverVulnerability
its
products
after
being notified
Vulnerability-related.DiscoverVulnerability
by
researchers
.
The
security
researcher
noted
Vulnerability-related.DiscoverVulnerability
that
the
new
flaw
arose
Vulnerability-related.DiscoverVulnerability
after
D-Link
reported
that
it
had fixed
Vulnerability-related.PatchVulnerability
a
prior
security
flaw
.
Also
known
as
“
directory
traversal
”
or
“
dot
dot
slash
”
attacks
,
these
flaws
allow
a
malicious
attacker
to
gain
access
to
system
files
with
a
simple
HTTP
request
.
Despite
D-Link
’
s
spotty
history
with
supporting
older
router
models
,
the
manufacturer
is
not
alone
in
leaving
routers
unpatched
Vulnerability-related.PatchVulnerability
.
The
American
Consumer
Institute
reported
Vulnerability-related.DiscoverVulnerability
that
of
the
186
routers
it
had
tested
,
155
contained
Vulnerability-related.DiscoverVulnerability
firmware
vulnerabilities
.
In
total
,
ACI
discovered
Vulnerability-related.DiscoverVulnerability
more
than
32,000
known
vulnerabilities
in
its
study
.
“
Our
analysis
shows
that
,
on
average
,
routers
contained
Vulnerability-related.DiscoverVulnerability
12
critical
vulnerabilities
and
36
high-risk
vulnerabilities
,
across
the
entire
sample
,
”
ACI
noted
in
its
report
.
“
The
most
common
vulnerabilities
were
medium-risk
,
with
an
average
of
103
vulnerabilities
per
router.
”
For
shoppers
who
are
in
the
market
for
a
new
router
,
it
’
s
probably
best
to
also
check
with
the
manufacturer
to
see
what
the
supported
lifespan
of
the
router
is
.
If
the
router
is
nearing
its
end
of
life
,
as
in
the
case
illustrated
here
,
you
may
not
get
Vulnerability-related.PatchVulnerability
patches
,
regardless
of
how
serious
a
security
vulnerability
may
be
.
If
you
have
an
older
router
,
you
may
want
to
consider
checking
out
our
guide
for
the
best
router
options
before
you
decide
to
upgrade
.
Apple
is reportedly aware
Vulnerability-related.DiscoverVulnerability
of
and
is
in
the
middle
of
fixing
Vulnerability-related.PatchVulnerability
a
pair
of
vulnerabilities
that
exist
in
iTunes
and
the
App
Store
.
If
exploited
Vulnerability-related.DiscoverVulnerability
,
researchers
claim
Vulnerability-related.DiscoverVulnerability
an
attacker
could
inject
malicious
script
into
the
application
side
of
the
vulnerable
module
or
function
.
Vulnerability
Lab
’
s
Benjamin
Kunz
Mejri
disclosed
Vulnerability-related.DiscoverVulnerability
the
vulnerabilities
on
Monday
,
explaining
Vulnerability-related.DiscoverVulnerability
the
issues
can
be
jointly
exploited
Vulnerability-related.DiscoverVulnerability
via
iTunes
and
the
App
Store
’
s
iOS
“
Notify
”
function
.
Apple
implemented
the
function
in
September
,
in
the
weeks
leading
up
to
the
release
of
the
game
Super
Mario
Run
.
The
function
takes
information
from
the
device
,
such
iCloud
credentials
or
devicename
values
,
to
alert
users
when
a
soon-to-launch
application
debuts
.
Mejri
,
the
firm
’
s
founder
,
claims
Vulnerability-related.DiscoverVulnerability
the
Notify
functionality
can
be exploited
Vulnerability-related.DiscoverVulnerability
via
a
persistent
input
validation
vulnerability
and
mail
encoding
web
vulnerability
.
An
attacker
could
substitute
the
name
variable–the
vulnerable
firstname
parameter–with
a
script
launching
a
payload
.
Mejri
said
the
issue
stems
from
how
Apple
sends
notifications
from
its
@
new-itunes.com
web
server
;
which
doesn
’
t
properly
validate
the
iCloud
name
or
devicename
parameter
.
Instead
of
displaying
introductory
text
,
it
can
be
rigged
to
execute
malicious
payloads
.
“
The
vulnerability
can
be exploited
Vulnerability-related.DiscoverVulnerability
on
restricted
accessible
iOS
devices
to
the
main
account
holder
inbox
,
”
Mejri
wrote in his disclosure
Vulnerability-related.DiscoverVulnerability
Monday
,
“
The
issue
could
be
used
as
well
to
continue
to
calendar
spam
activities
”
.
Mejri
told
Vulnerability-related.DiscoverVulnerability
Threatpost
Tuesday
that
while
the
issue
isn
’
t
highly
exploitable
,
it
“
definitely
has
a
nice
impact
”
.
Exploiting
the
persistent
input
validation
flaw
would
be
easier
,
because
it
only
requires
an
Apple
account
and
“
low
or
medium
user
interaction
,
”
according
to
the
researcher
.
Ultimately
,
if
stitched
together
,
he
warns
Vulnerability-related.DiscoverVulnerability
,
the
bugs
could
result
in
session
hijacking
,
persistent
phishing
attacks
,
and
persistent
redirect
to
external
sources
.
Mejri
said
Vulnerability-related.DiscoverVulnerability
he
contacted
Vulnerability-related.DiscoverVulnerability
Apple
’
s
Product
Security
Team
about
the
issues
on
Dec.
15
and
acknowledged
Vulnerability-related.DiscoverVulnerability
that
the
vulnerability
should
be
able
to
be
resolved
on
the
server-side
without
performing
any
required
end-user
interaction
or
updates
.
He
said
a
temporary
patch
has been implemented
Vulnerability-related.PatchVulnerability
and
believes
a
full
fix
is expected
Vulnerability-related.PatchVulnerability
later
this
month
.
It
’
s
unclear
exactly
when
this
month
Apple
will push that fix
Vulnerability-related.PatchVulnerability
,
however
;
it
last
updated
iTunes
in
December
,
fixing
Vulnerability-related.PatchVulnerability
23
WebKit
vulnerabilities
in
the
software
.
Apple
did
not
return
multiple
requests
for
comment regarding
Vulnerability-related.DiscoverVulnerability
the
vulnerabilities
on
Monday
and
Tuesday
.
A
month
after
first
communicating
the
issues
to
Apple
,
Vulnerability
Lab
elected
to
publish
a
proof
of
concept
around
the
issues
to
see
if
they
had
any
legs
.
“
We
decided
to
release
the
information
until
somebody
uses
the
issue
to
exploit
via
iTunes
,
”
Kunz
Mejri
told
Threatpost
Tuesday
.
The
vulnerability
is
similar
to
one
disclosed
Vulnerability-related.DiscoverVulnerability
by
Vulnerability
Lab
and
patched
Vulnerability-related.PatchVulnerability
by
Apple
in
iTunes
and
the
App
Store
a
year
and
a
half
ago
.
Before
it
was fixed
Vulnerability-related.PatchVulnerability
,
like
this
week
’
s
issue
,
an
attacker
could
have
remotely
injected
script
into
invoices
,
something
that
could
have
lead
to
hijacking
,
phishing
,
and
redirect
.