8.8

CVE-2017-7852

Exploit

D-Link DCS cameras have a weak/insecure CrossDomain.XML file that allows sites hosting malicious Flash objects to access and/or change the device's settings via a CSRF attack. This is because of the 'allow-access-from domain' child element set to *, thus accepting requests from any domain. If a victim logged into the camera's web console visits a malicious site hosting a malicious Flash file from another Browser tab, the malicious Flash file then can send requests to the victim's DCS series Camera without knowing the credentials. An attacker can host a malicious Flash file that can retrieve Live Feeds or information from the victim's DCS series Camera, add new admin users, or make other changes to the device. Known affected devices are DCS-933L with firmware before 1.13.05, DCS-5030L, DCS-5020L, DCS-2530L, DCS-2630L, DCS-930L, DCS-932L, and DCS-932LB1.

Data is provided by the National Vulnerability Database (NVD)
DlinkDcs-2230l Firmware Version <= 1.03.01
   DlinkDcs-2230l Version-
DlinkDcs-2310l Firmware Version <= 1.08.01
   DlinkDcs-2310l Version-
DlinkDcs-2332l Firmware Version <= 1.08.01
   DlinkDcs-2332l Version-
DlinkDcs-6010l Firmware Version <= 1.15.01
   DlinkDcs-6010l Version-
DlinkDcs-7010l Firmware Version <= 1.08.01
   DlinkDcs-7010l Version-
DlinkDcs-2530l Firmware Version <= 1.00.21
   DlinkDcs-2530l Version-
DlinkDcs-930l Firmware Version <= 1.15.04
   DlinkDcs-930l Version-
DlinkDcs-930l Firmware Version <= 2.13.15
   DlinkDcs-930l Version-
DlinkDcs-932l Firmware Version <= 1.13.04
   DlinkDcs-932l Version-
DlinkDcs-932l Firmware Version <= 2.13.15
   DlinkDcs-932l Version-
DlinkDcs-934l Firmware Version <= 1.04.15
   DlinkDcs-934l Version-
DlinkDcs-942l Firmware Version <= 1.27
   DlinkDcs-942l Version-
DlinkDcs-942l Firmware Version <= 2.11.03
   DlinkDcs-942l Version-
DlinkDcs-931l Firmware Version <= 1.13.05
   DlinkDcs-931l Version-
DlinkDcs-933l Firmware Version <= 1.13.05
   DlinkDcs-933l Version-
DlinkDcs-5009l Firmware Version <= 1.07.05
   DlinkDcs-5009l Version-
DlinkDcs-5010l Firmware Version <= 1.13.05
   DlinkDcs-5010l Version-
DlinkDcs-5020l Firmware Version <= 1.13.05
   DlinkDcs-5020l Version-
DlinkDcs-5000l Firmware Version <= 1.02.02
   DlinkDcs-5000l Version-
DlinkDcs-5025l Firmware Version <= 1.02.10
   DlinkDcs-5025l Version-
DlinkDcs-5030l Firmware Version <= 1.01.06
   DlinkDcs-5030l Version-
DlinkDcs-2210l Firmware Version <= 1.03.01
   DlinkDcs-2210l Version-
DlinkDcs-2136l Firmware Version <= 1.04.01
   DlinkDcs-2136l Version-
DlinkDcs-2132l Firmware Version <= 1.08.01
   DlinkDcs-2132l Version-
DlinkDcs-7000l Firmware Version <= 1.04.00
   DlinkDcs-7000l Version-
DlinkDcs-6212l Firmware Version <= 1.00.12
   DlinkDcs-6212l Version-
DlinkDcs-5029l Firmware Version <= 1.12.00
   DlinkDcs-5029l Version-
DlinkDcs-2310l Firmware Version <= 2.03.00
   DlinkDcs-2310l Version-
DlinkDcs-2330l Firmware Version <= 1.13.00
   DlinkDcs-2330l Version-
DlinkDcs-2132l Firmware Version <= 2.12.00
   DlinkDcs-2132l Version-
DlinkDcs-5222l Firmware Version <= 2.12.00
   DlinkDcs-5222l Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1% 0.76
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-352 Cross-Site Request Forgery (CSRF)

The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.