• ASUS routers vulnerable to critical remote code execution flaws

    Home » Forums » Cyber Security Information and Advisories » Code Red – Security/Privacy advisories » ASUS routers vulnerable to critical remote code execution flaws

    Author
    Topic
    #2585527

    https://www.bleepingcomputer.com/news/security/asus-routers-vulnerable-to-critical-remote-code-execution-flaws/

    Three critical-severity remote code execution vulnerabilities impact ASUS RT-AX55, RT-AX56U_V2, and RT-AC86U routers, potentially allowing threat actors to hijack devices if security updates are not installed.

    These three WiFi routers are popular high-end models within the consumer networking market, currently available on the ASUS website, favored by gamers and users with demanding performance needs.

    The flaws, which all have a CVSS v3.1 score of 9.8 out of 10.0, are format string vulnerabilities that can be exploited remotely and without authentication, potentially allowing remote code execution, service interruptions, and performing arbitrary operations on the device…

    The recommended solution is to apply the following firmware updates:

    RT-AX55: 3.0.0.4.386_51948 or later
    RT-AX56U_V2: 3.0.0.4.386_51948 or later
    RT-AC86U: 3.0.0.4.386_51915 or later
    ASUS released patches that address the three flaws in early August 2023 for RT-AX55, in May 2023 for AX56U_V2, and in July 2023 for RT-AC86U…

    Furthermore, as many consumer router flaws target the web admin console, it is strongly advised to turn off the remote administration (WAN Web Access) feature to prevent access from the internet.

    Viewing 2 reply threads
    Author
    Replies
    • #2585764

      it is strongly advised to turn off the remote administration

      This should be the default for any router you own. The only access should be from your local network, never the internet.

      cheers, Paul

      1 user thanked author for this post.
    • #2585767

      it is strongly advised to turn off the remote administration

      This should be the default for any router you own. The only access should be from your local network, never the internet.

      cheers, Paul

      Not if you want to stream or connect when away from home, from/to your NAS/Network…

      • #2585971

        This attack is via the management port. Connecting to your network via VPN is not leaving the remote management port open to the internet.

        cheers, Paul

        2 users thanked author for this post.
    • #2585804

      In the Venn diagram of computing, convenience and security never overlap. Throw in any third attribute you like.

      1 user thanked author for this post.
    Viewing 2 reply threads
    Reply To: ASUS routers vulnerable to critical remote code execution flaws

    You can use BBCodes to format your content.
    Your account can't use all available BBCodes, they will be stripped before saving.

    Your information: