Lucene search

K
certCERTVU:984366
HistoryOct 04, 2013 - 12:00 a.m.

ASUS RT-N10E Wireless Router vulnerable to authentication bypass

2013-10-0400:00:00
www.kb.cert.org
76

6.1 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:A/AC:L/Au:N/C:C/I:N/A:N

0.001 Low

EPSS

Percentile

39.6%

Overview

ASUS RT-N10E Wireless Routers contain an authentication bypass vulnerability (CWE-592).

Description

CWE-592: Authentication Bypass Issues

ASUS RT-N10E Wireless Routers contain an authentication bypass vulnerability. An attacker with network access to the device can navigate to the web page <http://RouterIPAddress/qis/QIS_finish.htm>`` The attacker will be presented with a web page containing the device’s configuration without entering any login credentials. This web page will display the device’s administrator password. The default configuration for this device is to only allow clients connected to the Local Area Network (LAN) to access the system web interface.

This vulnerability has been reported in ASUS Wireless-N150 Router RT-N10E firmware versions 2.0.0.24 and earlier.


Impact

An unauthenticated attacker that is connected to router’s LAN may be able to retrieve the device’s administrator password, allowing them to directly access the device’s configuration page.


Solution

Apply an Update
Asus has released firmware version 2.0.0.25 to address this vulnerability. If an update is not possible, please consider the following workarounds.


Restrict network access

Restrict network access to the ASUS Wireless-N150 Router RT-N10E system web interface and other devices using open protocols like HTTP.

Disable WAN device management

Restrict network access to the ASUS Wireless-N150 Router RT-N10E system web interface from Internet connections.


Vendor Information

984366

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

AsusTek Computer Inc. Affected

Notified: August 19, 2013 Updated: October 04, 2013

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

CVSS Metrics

Group Score Vector
Base 5.6 AV:L/AC:L/Au:N/C:C/I:P/A:N
Temporal 4.6 E:F/RL:OF/RC:C
Environmental 1.2 CDP:ND/TD:L/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Sanket Karalkar for reporting this vulnerability.

This document was written by Adam Rauf.

Other Information

CVE IDs: CVE-2013-3610
Date Public: 2013-10-04 Date First Published:

6.1 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:A/AC:L/Au:N/C:C/I:N/A:N

0.001 Low

EPSS

Percentile

39.6%