INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 1h Global supply_chain Software Development and DevOps CRITICAL 2h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors HIGH 4h Global general Digital Content & Intellectual Property MEDIUM 5h Global malware Technology and Software Development CRITICAL 5h Global ddos Technology and Social Media HIGH 5h Global phishing Financial Services, Telecommunications, General Public HIGH 6h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors / Critical Infrastructure CRITICAL 7h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 1h Global supply_chain Software Development and DevOps CRITICAL 2h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors HIGH 4h Global general Digital Content & Intellectual Property MEDIUM 5h Global malware Technology and Software Development CRITICAL 5h Global ddos Technology and Social Media HIGH 5h Global phishing Financial Services, Telecommunications, General Public HIGH 6h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors / Critical Infrastructure CRITICAL 7h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 1h Global supply_chain Software Development and DevOps CRITICAL 2h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors HIGH 4h Global general Digital Content & Intellectual Property MEDIUM 5h Global malware Technology and Software Development CRITICAL 5h Global ddos Technology and Social Media HIGH 5h Global phishing Financial Services, Telecommunications, General Public HIGH 6h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors / Critical Infrastructure CRITICAL 7h
Vulnerabilities

CVE-2011-4723

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
D-Link DIR-300 Router Cleartext Password Storage Vulnerability (CVE-2011-4723)
Published: Sep 8, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

D-Link DIR-300 Router Cleartext Storage of a Password Vulnerability — The D-Link DIR-300 router stores cleartext passwords, which allows context-dependent attackers to obtain sensitive information.

🤖 AI Executive Summary

D-Link DIR-300 routers store passwords in cleartext format, enabling attackers with physical or remote access to retrieve sensitive credentials. With a CVSS score of 9.0 and active exploits available, this critical vulnerability poses significant risks to network security. No official patch exists for this legacy device.

📄 Description (Arabic)

تتيح هذه الثغرة الأمنية الحرجة للمهاجمين الوصول إلى كلمات المرور المخزنة بنص واضح في ذاكرة جهاز التوجيه D-Link DIR-300 دون أي تشفير أو حماية. يمكن استغلال هذه الثغرة من قبل مهاجمين لديهم وصول محلي إلى واجهة إدارة الجهاز أو من خلال ثغرات أخرى تسمح بقراءة الذاكرة عن بُعد. بمجرد الحصول على كلمات المرور، يمكن للمهاجمين السيطرة الكاملة على الجهاز والشبكة المتصلة به، مما يعرض جميع الأجهزة والبيانات المتصلة للخطر. نظراً لعدم توفر تصحيح رسمي وكون الجهاز قديماً، يجب استبداله فوراً بأجهزة حديثة تلبي معايير الأمن السيبراني.

🤖 ملخص تنفيذي (AI)

تقوم أجهزة التوجيه D-Link DIR-300 بتخزين كلمات المرور بصيغة نص واضح، مما يمكّن المهاجمين الذين لديهم وصول فعلي أو عن بُعد من استرجاع بيانات الاعتماد الحساسة. مع درجة خطورة 9.0 ووجود استغلالات نشطة، تشكل هذه الثغرة الحرجة مخاطر كبيرة على أمن الشبكات. لا يوجد تصحيح رسمي لهذا الجهاز القديم.

🤖 AI Intelligence Analysis Analyzed: Feb 28, 2026 09:21
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations using legacy D-Link DIR-300 routers face immediate risk of credential theft and network compromise, violating NCA ECC-1 (Cybersecurity Governance) and SAMA CSF requirements for secure authentication. Small businesses, branch offices, and remote facilities may unknowingly operate these vulnerable devices, exposing corporate networks to unauthorized access and potential data breaches under PDPL jurisdiction.
🏢 Affected Saudi Sectors
القطاع المالي والمصرفي الاتصالات وتقنية المعلومات الشركات الصغيرة والمتوسطة التعليم الرعاية الصحية القطاع الحكومي التجزئة والتجارة الإلكترونية
⚖️ Saudi Risk Score (AI)
9.0
/ 10.0
🔧 Remediation Steps (English)
1. Immediately identify and inventory all D-Link DIR-300 routers in the network infrastructure through comprehensive asset discovery scans and physical audits of branch offices and remote locations.
2. Replace all D-Link DIR-300 devices with modern enterprise-grade routers that support encrypted credential storage, WPA3 encryption, and regular firmware updates compliant with NCA and SAMA security standards.
3. Implement network segmentation to isolate any remaining legacy devices until replacement, enforce strong password policies across all network equipment, and establish a hardware lifecycle management program to prevent deployment of end-of-life devices.
🔧 خطوات المعالجة (العربية)
1. تحديد وجرد جميع أجهزة التوجيه D-Link DIR-300 في البنية التحتية للشبكة فوراً من خلال عمليات مسح شاملة لاكتشاف الأصول والتدقيق الفعلي للمكاتب الفرعية والمواقع البعيدة.
2. استبدال جميع أجهزة D-Link DIR-300 بأجهزة توجيه حديثة على مستوى المؤسسات تدعم تخزين بيانات الاعتماد المشفرة وتشفير WPA3 وتحديثات البرامج الثابتة المنتظمة المتوافقة مع معايير الأمن السيبراني للهيئة الوطنية للأمن السيبراني ومؤسسة النقد.
3. تنفيذ تجزئة الشبكة لعزل أي أجهزة قديمة متبقية حتى استبدالها، وفرض سياسات كلمات مرور قوية عبر جميع معدات الشبكة، وإنشاء برنامج لإدارة دورة حياة الأجهزة لمنع نشر الأجهزة التي انتهى عمرها الافتراضي.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-2: Asset Management ECC-3-1: Access Control ECC-4-1: Cryptography ECC-5-1: Infrastructure Security
🔵 SAMA CSF
SAMA-CR-1.2: Asset Inventory SAMA-CR-2.1: Identity and Access Management SAMA-CR-3.3: Data Protection SAMA-CR-4.1: Network Security
🟡 ISO 27001:2022
A.8.1.1: Inventory of Assets A.9.2.1: User Registration and De-registration A.10.1.1: Policy on the Use of Cryptographic Controls A.13.1.1: Network Controls
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
D-Link:DIR-300 Router
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS12.73%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-09-29
Published 2022-09-08
Source Feed cisa_kev
Views 2
🇸🇦 Saudi Risk Score
9.0
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.