ASUS Fixes Critical Identity Verification Circumvention Flaw in Multiple Router Models

Jun 17, 2024NewsroomNetwork Security / Weakness

ASUS has sent patches to fix a critical security issue affecting its routers that could be utilized by malicious entities to bypass authentication.

ASUS Patches Critical Authentication Bypass Flaw in Multiple Router Models

Jun 17, 2024NewsroomNetwork Security / Weakness

ASUS Patches Critical Authentication Bypass Flaw in Multiple Router Models

ASUS has sent patches to fix a critical security issue affecting its routers that could be utilized by malicious entities to bypass authentication.

Identified as CVE-2024-3080, the security weakness has a CVSS score of 9.8 out of 10.0.

“Specific ASUS router models contain an authentication bypass flaw, enabling unauthenticated remote attackers to access the device,” as described by the Taiwan Computer Emergency Response Team / Coordination Center (TWCERT/CC).

Also addressed by the Taiwanese manufacturer is a critical buffer overflow vulnerability logged as CVE-2024-3079 (CVSS score: 7.2) which could be exploited by remote attackers with administrative privileges to perform unauthorized commands on the device.

Security

In a theoretical attack scenario, a malicious actor could combine CVE-2024-3080 and CVE-2024-3079 to bypass authentication and execute malicious code on vulnerable devices.

Both issues affect the following products –

  • ZenWiFi XT8 version 3.0.0.4.388_24609 and earlier (Fixed in 3.0.0.4.388_24621)
  • ZenWiFi XT8 version V2 3.0.0.4.388_24609 and earlier (Fixed in 3.0.0.4.388_24621)
  • RT-AX88U version 3.0.0.4.388_24198 and earlier (Fixed in 3.0.0.4.388_24209)
  • RT-AX58U version 3.0.0.4.388_23925 and earlier (Fixed in 3.0.0.4.388_24762)
  • RT-AX57 version 3.0.0.4.386_52294 and earlier (Fixed in 3.0.0.4.386_52303)
  • RT-AC86U version 3.0.0.4.386_51915 and earlier (Fixed in 3.0.0.4.386_51925)
  • RT-AC68U version 3.0.0.4.386_51668 and earlier (Fixed in 3.0.0.4.386_51685)

Earlier this January, ASUS dealt with another critical vulnerability logged as (CVE-2024-3912, CVSS score: 9.8) that could allow an unauthenticated remote attacker to upload random files and execute system commands on the device.

Users of affected routers are encouraged to upgrade to the latest version to protect against potential risks.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.