Lucene search

K
wallarmlabNikhil MenonWALLARMLAB:9D7B2F95DC49AD482D85ACF9171F5442
HistoryJun 21, 2024 - 5:13 p.m.

CVE-2024-3080: ASUS warns Customers about the latest Authentication Bypass Vulnerability detected Across seven Router Models

2024-06-2117:13:45
Nikhil Menon
lab.wallarm.com
6
asus
firmware update
authentication bypass
vulnerability
router models
cve-2024-3080
security
remote attackers
control
affected
versions
firmware
update
network
compromise
mitigation
router settings
strong passwords
internet access
download master

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.3%

ASUS announces major Firmware Update

ASUS recently issued a firmware update to resolve a critical security vulnerability affecting seven different variants of its router models.

Identified as CVE-2024-3080 with a CVSS v3 severity score of 9.8 (critical), the vulnerability permits remote attackers to take control of the affected router models without needing any login credentials.

While the main reason behind this flaw hasnโ€™t been disclosed by Asus yet, it could be the result of age-old conventional issues like poorly implemented encryption protocols, hardcoded credentials, or the failure to properly validate input data. As a result, malicious actors can exploit this flaw to gain administrative control over the affected routers.

Product Models and Versions affected by the Authentication Bypass Flaw

The vulnerability was first detected in the wild on June 14th across the following Asus router models:

Models Versions
ZenWiFi XT8 3.0.0.4.388_24609 and earlier
ZenWiFi XT8 V2 3.0.0.4.388_24609 and earlier
RT-AX88U 3.0.0.4.388_24198 and earlier
RT-AX58U 3.0.0.4.388_23925 and earlier
RT-AX57 3.0.0.4.386_52294 and earlier
RT-AC86U 3.0.0.4.386_51915 and earlier
RT-AC68U 3.0.0.4.386_51668 and earlier
For more details, visit Asusโ€™ official FAQ & Support page.

***Note****: **Certain affected models will not receive the firmware updates because they have been designated as end-of-life (EoL).

Why should Asusโ€™ Customers Worry about this Flaw?

Under normal circumstances, routers are configured to require a username and password for administrative access. This security measure blocks unauthorized individuals from making modifications that could jeopardize the networkโ€™s security or operational integrity.

However, if attackers exploit this vulnerability, they can gain access to the compromised routers and carry out various malicious actions. They might change the routerโ€™s settings - such as altering DNS configurations to reroute internet traffic through malicious servers. This redirection can facilitate phishing schemes, data interception, or man-in-the-middle attacks. Furthermore, attackers could extract sensitive information stored on the router (including network credentials) and infiltrate other devices connected to the network.

In more severe scenarios, attackers might use the compromised router as a launchpad for further attacks within the local network, spreading malware or engaging in espionage. The consequences of this vulnerability are particularly severe because routers serve as vital components of network infrastructure, acting as the gateway between local networks and the internet.

Remediation - Mitigating the Vulnerability

ASUS advises users to upgrade their devices to the latest firmware versions. Detailed instructions can be found on their official download portal.

For those who cannot update the firmware right away, ASUS recommends the following preemptive measures:

- Create unique and strong passwords for your wireless network and router administration page. These passwords should include a combination of uppercase letters, numbers, and special symbols.

- Disable any services that are accessible via the internet. This includes disabling internet access to the admin panel, remote access from WAN, port forwarding, DDNS, VPN server, DMZ, and port triggering.

ASUS has also released an update for Download Master, a utility used on ASUS routers that allows users to manage and download files directly to a connected USB storage device via torrent, HTTP, or FTP.

The new version, Download Master 3.1.0.114, resolves five medium to high-severity vulnerabilities, including issues related to arbitrary file upload, OS command injection, buffer overflow, reflected XSS, and stored XSS.

The post CVE-2024-3080: ASUS warns Customers about the latest Authentication Bypass Vulnerability detected Across seven Router Models appeared first on Wallarm.

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.3%

Related for WALLARMLAB:9D7B2F95DC49AD482D85ACF9171F5442