Article Details
Scrape Timestamp (UTC): 2024-04-09 05:52:56.814
Source: https://thehackernews.com/2024/04/critical-flaws-leave-92000-d-link-nas.html
Original Article Text
Click to Toggle View
Critical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks. Threat actors are actively scanning and exploiting a pair of security flaws that are said to affect as many as 92,000 internet-exposed D-Link network-attached storage (NAS) devices. Tracked as CVE-2024-3272 (CVSS score: 9.8) and CVE-2024-3273 (CVSS score: 7.3), the vulnerabilities impact legacy D-Link products that have reached end-of-life (EoL) status. D-Link, in an advisory, said it does not plan to ship a patch and instead urges customers to replace them. "The vulnerability lies within the nas_sharing.cgi uri, which is vulnerable due to two main issues: a backdoor facilitated by hard-coded credentials, and a command injection vulnerability via the system parameter," security researcher who goes by the name netsecfish said in late March 2024. Successful exploitation of the flaws could lead to arbitrary command execution on the affected D-Link NAS devices, granting threat actors the ability to access sensitive information, alter system configurations, or even trigger a denial-of-service (DoS) condition. The issues affect the following models - Threat intelligence firm GreyNoise said it observed attackers attempting to weaponize the flaws to deliver the Mirai botnet malware, thus making it possible to remotely commandeer the D-Link devices. In the absence of a fix, the Shadowserver Foundation is recommending that users either take these devices offline or have remote access to the appliance firewalled to mitigate potential threats. The findings once again illustrate that Mirai botnets are continuously adapting and incorporating new vulnerabilities into their repertoire, with threat actors swiftly developing new variants that are designed to abuse these issues to breach as many devices as possible. With network devices becoming common targets for financially motivated and nation-state-linked attackers, the development comes as Palo Alto Networks Unit 42 revealed that threat actors are increasingly switching to malware-initiated scanning attacks to flag vulnerabilities in target networks. "Some scanning attacks originate from benign networks likely driven by malware on infected machines," the company said. "By launching scanning attacks from compromised hosts, attackers can accomplish the following: Covering their traces, bypassing geofencing, expanding botnets, [and] leveraging the resources of these compromised devices to generate a higher volume of scanning requests compared to what they could achieve using only their own devices." Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. How to Update and Automate Outdated Security Processes Download the eBook for step-by-step guidance on how to update your security processes as your business grows.
Daily Brief Summary
Two high-severity vulnerabilities, tracked as CVE-2024-3272 and CVE-2024-3273, affect nearly 92,000 D-Link network-attached storage (NAS) devices, which are now at end-of-life (EoL).
Threat actors have been scanning for and exploiting these security flaws, with potential for arbitrary command execution, sensitive data exposure, system configuration alteration, or DoS attacks on affected units.
D-Link has declined to provide a patch for the obsolete devices, advising customers to replace their vulnerable units instead.
Attacks observed by GreyNoise involve the notorious Mirai botnet malware, indicating that compromised devices could be remotely controlled by cybercriminals.
The Shadowserver Foundation recommends that users disconnect these NAS devices from the internet or limit remote access with stringent firewall rules to prevent exploitation.
These security incidents highlight the evolving threat landscape wherein cyber attackers, including financially driven and nation-state groups, exploit network device vulnerabilities, adapting their methods and malware accordingly.
Palo Alto Networks Unit 42 exposes a trend where malware on infected hosts initiates network vulnerability scanning, which helps attackers conceal their activities, bypass defense mechanisms, and expand the reach of their botnets.