// For flags

CVE-2019-13265

 

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

D-link DIR-825AC G1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. They forward ARP requests, which are sent as broadcast packets, between the host and the guest networks. To use this leakage as a direct covert channel, the sender can trivially issue an ARP request to an arbitrary computer on the network. (In general, some routers restrict ARP forwarding only to requests destined for the network's subnet mask, but these routers did not restrict this traffic in any way. Depending on this factor, one must use either the lower 8 bits of the IP address, or the entire 32 bits, as the data payload.)

Los dispositivos D-link DIR-825AC G1 poseen una Compartimentación Insuficiente entre una red host y una red invitada que es establecida por el mismo dispositivo. Estos reenvían peticiones ARP, que se envían como paquetes de difusión, entre las redes host y las invitadas. Para usar esta filtración como un canal secreto directo, el remitente puede emitir trivialmente una petición ARP hacia una computadora arbitraria sobre la red. (En general, algunos routers restringen el reenvío ARP solo a las peticiones destinadas a la máscara de subred de la red, pero estos rotuers no restringieron este tráfico de ninguna manera. Dependiendo de este factor, se debe usar los 8 bits inferiores de la dirección IP o los 32 bits completos, como la carga útil de datos).

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-07-04 CVE Reserved
  • 2019-08-27 CVE Published
  • 2023-04-28 EPSS Updated
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Dlink
Search vendor "Dlink"
Dir-825\/ac G1 Firmware
Search vendor "Dlink" for product "Dir-825\/ac G1 Firmware"
--
Affected
in Dlink
Search vendor "Dlink"
Dir-825\/ac G1
Search vendor "Dlink" for product "Dir-825\/ac G1"
--
Safe