D-Link will not fix a critical vulnerability in discontinued NAS devices

Alfonso Maruccia

Posts: 1,706   +499
Staff
Facepalm: Microsoft occasionally releases rare, out-of-band security updates for its older operating systems when a vulnerability is particularly severe. In contrast, companies like D-Link seem content to leave former users exposed to potentially disastrous network security risks.

A recently disclosed security vulnerability impacting D-Link NAS devices will remain unpatched, as the Taiwanese manufacturer confirmed these models have reached their end-of-life / end-of-service status. This means they are likely to stay permanently vulnerable, a situation that has raised concerns among security analysts.

The vulnerability, tracked as CVE-2024-10914, affects the DNS-320, DNS-320LW, DNS-325, and DNS-340L NAS systems with firmware up to version 20241028. This critical flaw is located in the "cgi_user_add" command and can be triggered via a specially crafted HTTP GET request. The command fails to properly sanitize the "name" parameter, allowing an attacker to inject shell commands.

While the National Institute of Standards and Technology noted that the attack complexity is "high," exploitation is possible, as researchers have already disclosed a working exploit online. These NAS devices were once popular among small businesses, but D-Link has since discontinued this line of network storage products.

The company recently published a security bulletin regarding the matter, acknowledging the "Command Injection Vulnerability" discovered by NetSecFish in the DNS-320, DNS-325, DNS-340L, and other NAS models. D-Link advised owners of these affected devices to retire them and consider replacing them with newer alternatives.

In the bulletin, D-Link reiterated its policy that end-of-life and end-of-service products are no longer supported and that firmware development for these models has ceased. NetSecFish estimated that over 61,000 vulnerable devices remain connected to the internet, putting them at risk of exploitation through malicious HTTP GET requests, which could result in data breaches or botnet activity.

D-Link offered some general advice for users who continue to connect these critically vulnerable NAS devices to the internet. They recommended ensuring the latest firmware is installed, using a unique password, and enabling Wi-Fi encryption. While these steps provide some basic security, they do little to mitigate the CVE-2024-10914 vulnerability itself.

Earlier this year, the same researcher identified an additional command injection vulnerability and a hardcoded backdoor in the same NAS models (CVE-2024-3273). D-Link did not issue a fix or firmware update for that vulnerability, either.

Permalink to story:

 
I've always considered Internet-connected NAS software stupidly risky. Safe ways to make data available on the Net exist and are easily obtained and used.

Little disclaimer: I don't use any of that myself - my data storage is for home-use only.
 
Just pulled my DNS-323 out of mothballs for a little project. While it's not listed, I'd have to assume it has the same vulnerability. I did load "Alt-F" on it (don't really know if that's better or worse), but either way, it won't matter to me, it won't be internet facing.
 
"D-Link will not fix a critical vulnerability in discontinued NAS devices", that is a serious D-move.
 
I had one of the units pictured but it died. Or did it? Either way it's been recycled. I did replace it with a Seagate unit that used adobe flash for its web config page. So yeah, it works but can't be accessed, that might be a good thing. As for net security, I finally got tired of hearing about all the vulnerabilities in the average consumer unit and decided screw it. Used an old ITX box and installed OPNsense on it. Was easy and now no buffer bloat so I'm happy.
 
Back