CVE-2017-7852

high-risk
Published 2017-04-24

D-Link DCS cameras have a weak/insecure CrossDomain.XML file that allows sites hosting malicious Flash objects to access and/or change the device's settings via a CSRF attack. This is because of the 'allow-access-from domain' child element set to *, thus accepting requests from any domain. If a victim logged into the camera's web console visits a malicious site hosting a malicious Flash file from another Browser tab, the malicious Flash file then can send requests to the victim's DCS series Camera without knowing the credentials. An attacker can host a malicious Flash file that can retrieve Live Feeds or information from the victim's DCS series Camera, add new admin users, or make other changes to the device. Known affected devices are DCS-933L with firmware before 1.13.05, DCS-5030L, DCS-5020L, DCS-2530L, DCS-2630L, DCS-930L, DCS-932L, and DCS-932LB1.

Do I need to act?

-
0.89% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10 High
NETWORK / LOW complexity

Affected Products (20)

Dcs-2230L Firmware
Dcs-2310L Firmware
Dcs-2332L Firmware
Dcs-6010L Firmware
Dcs-933L Firmware
Dcs-5020L Firmware
Dcs-5000L Firmware
Dcs-2132L Firmware
Dcs-2330L Firmware
Dcs-5222L Firmware
Dcs-7010L Firmware
Dcs-932L Firmware
Dcs-942L Firmware
Dcs-931L Firmware

Affected Vendors

54
/ 100
high-risk
Severity 30/34 · Critical
Exploitability 3/34 · Minimal
Exposure 21/34 · High