Best to switch off immediately: Older D-Link NAS models at risk
News + Trends

Best to switch off immediately: Older D-Link NAS models at risk

Martin Jud
12.4.2024
Translation: machine translated

A total of 20 NAS models from D-Link are currently under active attack. The affected models are no longer receiving security updates. The manufacturer is therefore proposing that they be taken out of service and replaced.

On 26 March, a third-party security research provider drew D-Link's attention to the fact that some of its older NAS models had two security vulnerabilities. Thanks to these, third parties can gain access to the network storage devices via the internet using an exploit.

The worst thing about this is that it is sufficient if port forwarding is defined for one of the affected NAS. In other words, if the NAS web interface can be accessed from the internet. A password is not required for access. After all, the exploit only affects older products that have already reached their end of life (EOL). What's worse is that they no longer receive updates as a result.

Affected devices have increased fivefold overnight

After D-Link was informed about the security vulnerabilities, the company announced on 4 April that four devices were affected (DNS-340L, DNS-320L, DNS-327L and DNS-325). The backdoors are loopholes that enable command injection and backdoor account attacks. The attack only requires the victim's IP address, some knowledge and a CGI script, which ultimately enables the execution of arbitrary shell commands.

D-Link has now updated the list of affected systems overnight. A total of 20 devices have been affected since 12 April. The company advises anyone with a device affected to take it out of service and replace it.

Here is the list of all models that should no longer be used:

  • DNR-322L (EOL since 2021)
  • DNR-202L (EOL since 2020)
  • DNS-1200-05 (EOL since 2020)
  • DNS-1550-04 (EOL since 2020)
  • DNS-320L (EOL since 2020)
  • DNS-320LW (EOL since 2020)
  • DNS-327L (EOL since 2020)
  • DNS-343 (EOL since 2020)
  • DNS-340L (EOL since 2019)
  • DNS-345 (EOL since 2019)
  • DNR-326 (EOL since 2018)
  • DNS-1100-4 (EOL since 2018)
  • DNS-320 (EOL since 2018)
  • DNS-325 (EOL since 2017)
  • DNS-315L (EOL since 2014)
  • DNS-726-4 (EOL since 2014)
  • DNS-321 (EOL since 2013)
  • DNS-323 (EOL since 2013)
  • DNS-326 (EOL since 2013)
  • DNS-120 (EOL since 2009)

It is certain that the vulnerabilities are already being actively exploited. This is why the Cybersecurity and Infrastructure Security Agency (CISA) of the USA has also been warning of this since 11 April. <p

Header image: D-Link

78 people like this article


User Avatar
User Avatar

I find my muse in everything. When I don’t, I draw inspiration from daydreaming. After all, if you dream, you don’t sleep through life.


These articles might also interest you

Comments

Avatar