Lucene search

K
cve[email protected]CVE-2021-3128
HistoryApr 12, 2021 - 7:15 p.m.

CVE-2021-3128

2021-04-1219:15:14
CWE-834
web.nvd.nist.gov
33
2
asus
router
firmware
vulnerability
ipv6
routing loop
network traffic
nvd
cve-2021-3128

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.3 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.012 Low

EPSS

Percentile

85.5%

In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42095 or < 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP’s router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set.

Affected configurations

NVD
Node
asuszenwifi_ax_\(xt8\)Match-
AND
asuszenwifi_ax_\(xt8\)_firmwareRange<3.0.0.4.386.42095
Node
asuszenwifi_ax_\(xt8\)Match-
AND
asuszenwifi_ax_\(xt8\)_firmwareRange<9.0.0.4.386.41994
Node
asusrt-ax3000Match-
AND
asusrt-ax3000_firmwareRange<3.0.0.4.386.42095
Node
asusrt-ax3000Match-
AND
asusrt-ax3000_firmwareRange<9.0.0.4.386.41994
Node
asusrt-ax55Match-
AND
asusrt-ax55_firmwareRange<3.0.0.4.386.42095
Node
asusrt-ax55Match-
AND
asusrt-ax55_firmwareRange<9.0.0.4.386.41994
Node
asusrt-ax56uMatch-
AND
asusrt-ax56u_firmwareRange<3.0.0.4.386.42095
Node
asusrt-ax56uMatch-
AND
asusrt-ax56u_firmwareRange<9.0.0.4.386.41994
Node
asusrt-ax58u_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ax58uMatch-
Node
asusrt-ax58u_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ax58uMatch-
Node
asusrt-ax68u_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ax68uMatch-
Node
asusrt-ax68u_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ax68uMatch-
Node
asusrt-ax82u_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ax82uMatch-
Node
asusrt-ax82u_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ax82uMatch-
Node
asusrt-ax86u_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ax86uMatch-
Node
asusrt-ax86u_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ax86uMatch-
Node
asusrt-ax88u_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ax88uMatch-
Node
asusrt-ax88u_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ax88uMatch-
Node
asusrt-ac66u_b1_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac66u_b1Match-
Node
asusrt-ac66u_b1_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac66u_b1Match-
Node
asusrt-ac1750_b1_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac1750_b1Match-
Node
asusrt-ac1750_b1_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac1750_b1Match-
Node
asusrt-ac1900_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac1900Match-
Node
asusrt-ac1900_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac1900Match-
Node
asusrt-ac1900p_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac1900pMatch-
Node
asusrt-ac1900p_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac1900pMatch-
Node
asusrt-ac1900u_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac1900uMatch-
Node
asusrt-ac1900u_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac1900uMatch-
Node
asusrt-ac2900_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac2900Match-
Node
asusrt-ac2900_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac2900Match-
Node
asusrt-ac3100_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac3100Match-
Node
asusrt-ac3100_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac3100Match-
Node
asusrt-ac5300_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac5300Match-
Node
asusrt-ac5300_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac5300Match-
Node
asusrt-ac58u_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac58uMatch-
Node
asusrt-ac58u_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac58uMatch-
Node
asusrt-ac65u_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac65uMatch-
Node
asusrt-ac65u_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac65uMatch-
Node
asusrt-ac68p_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac68pMatch-
Node
asusrt-ac68p_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac68pMatch-
Node
asusrt-ac68r_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac68rMatch-
Node
asusrt-ac68r_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac68rMatch-
Node
asusrt-ac68rw_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac68rwMatch-
Node
asusrt-ac68rw_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac68rwMatch-
Node
asusrt-ac68u_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac68uMatch-
Node
asusrt-ac68u_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac68uMatch-
Node
asusrt-ac68w_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac68wMatch-
Node
asusrt-ac68w_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac68wMatch-
Node
asusrt-ac85u_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac85uMatch-
Node
asusrt-ac85u_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac85uMatch-
Node
asusrt-ac86u_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac86uMatch-
Node
asusrt-ac86u_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac86uMatch-
Node
asusrt-ac88u_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac88uMatch-
Node
asusrt-ac88u_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac88uMatch-

References

Social References

More

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.3 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.012 Low

EPSS

Percentile

85.5%

Related for CVE-2021-3128