Lucene search

K
nvd[email protected]NVD:CVE-2021-3128
HistoryApr 12, 2021 - 7:15 p.m.

CVE-2021-3128

2021-04-1219:15:14
CWE-834
web.nvd.nist.gov

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.012 Low

EPSS

Percentile

85.5%

In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42095 or < 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP’s router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set.

Affected configurations

NVD
Node
asuszenwifi_ax_\(xt8\)Match-
AND
asuszenwifi_ax_\(xt8\)_firmwareRange<3.0.0.4.386.42095
Node
asuszenwifi_ax_\(xt8\)Match-
AND
asuszenwifi_ax_\(xt8\)_firmwareRange<9.0.0.4.386.41994
Node
asusrt-ax3000Match-
AND
asusrt-ax3000_firmwareRange<3.0.0.4.386.42095
Node
asusrt-ax3000Match-
AND
asusrt-ax3000_firmwareRange<9.0.0.4.386.41994
Node
asusrt-ax55Match-
AND
asusrt-ax55_firmwareRange<3.0.0.4.386.42095
Node
asusrt-ax55Match-
AND
asusrt-ax55_firmwareRange<9.0.0.4.386.41994
Node
asusrt-ax56uMatch-
AND
asusrt-ax56u_firmwareRange<3.0.0.4.386.42095
Node
asusrt-ax56uMatch-
AND
asusrt-ax56u_firmwareRange<9.0.0.4.386.41994
Node
asusrt-ax58u_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ax58uMatch-
Node
asusrt-ax58u_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ax58uMatch-
Node
asusrt-ax68u_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ax68uMatch-
Node
asusrt-ax68u_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ax68uMatch-
Node
asusrt-ax82u_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ax82uMatch-
Node
asusrt-ax82u_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ax82uMatch-
Node
asusrt-ax86u_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ax86uMatch-
Node
asusrt-ax86u_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ax86uMatch-
Node
asusrt-ax88u_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ax88uMatch-
Node
asusrt-ax88u_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ax88uMatch-
Node
asusrt-ac66u_b1_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac66u_b1Match-
Node
asusrt-ac66u_b1_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac66u_b1Match-
Node
asusrt-ac1750_b1_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac1750_b1Match-
Node
asusrt-ac1750_b1_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac1750_b1Match-
Node
asusrt-ac1900_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac1900Match-
Node
asusrt-ac1900_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac1900Match-
Node
asusrt-ac1900p_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac1900pMatch-
Node
asusrt-ac1900p_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac1900pMatch-
Node
asusrt-ac1900u_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac1900uMatch-
Node
asusrt-ac1900u_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac1900uMatch-
Node
asusrt-ac2900_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac2900Match-
Node
asusrt-ac2900_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac2900Match-
Node
asusrt-ac3100_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac3100Match-
Node
asusrt-ac3100_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac3100Match-
Node
asusrt-ac5300_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac5300Match-
Node
asusrt-ac5300_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac5300Match-
Node
asusrt-ac58u_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac58uMatch-
Node
asusrt-ac58u_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac58uMatch-
Node
asusrt-ac65u_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac65uMatch-
Node
asusrt-ac65u_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac65uMatch-
Node
asusrt-ac68p_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac68pMatch-
Node
asusrt-ac68p_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac68pMatch-
Node
asusrt-ac68r_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac68rMatch-
Node
asusrt-ac68r_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac68rMatch-
Node
asusrt-ac68rw_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac68rwMatch-
Node
asusrt-ac68rw_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac68rwMatch-
Node
asusrt-ac68u_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac68uMatch-
Node
asusrt-ac68u_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac68uMatch-
Node
asusrt-ac68w_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac68wMatch-
Node
asusrt-ac68w_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac68wMatch-
Node
asusrt-ac85u_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac85uMatch-
Node
asusrt-ac85u_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac85uMatch-
Node
asusrt-ac86u_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac86uMatch-
Node
asusrt-ac86u_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac86uMatch-
Node
asusrt-ac88u_firmwareRange<3.0.0.4.386.42095
AND
asusrt-ac88uMatch-
Node
asusrt-ac88u_firmwareRange<9.0.0.4.386.41994
AND
asusrt-ac88uMatch-

References

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.012 Low

EPSS

Percentile

85.5%

Related for NVD:CVE-2021-3128