Asus Router 3.0.0.4.374_168 Error Page Security Bypass improper authentication
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.6 | $0-$5k | 0.00 |
Summary
A vulnerability classified as critical was found in Asus Router 3.0.0.4.374_168. This vulnerability affects unknown code of the component Error Page. Such manipulation leads to improper authentication (Security Bypass). There is no available exploit. Upgrading the affected component is advised.
Details
A vulnerability was found in Asus Router 3.0.0.4.374_168 (Router Operating System) and classified as critical. Affected by this issue is an unknown function of the component Error Page. The manipulation with an unknown input leads to a improper authentication vulnerability (Security Bypass). Using CWE to declare the problem leads to CWE-287. When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. Impacted is integrity.
The weakness was presented 02/22/2014 by Harry Sintonen (Piru) as ASUS Router Authentication Bypass / Cross Site Scripting (Website). The advisory is shared for download at packetstormsecurity.com. The exploitation is known to be easy. The attack may be launched remotely. No form of authentication is required for exploitation. There are neither technical details nor an exploit publicly available.
Upgrading eliminates this vulnerability. The upgrade is hosted for download at asus.com.
The vulnerability is also documented in the databases at X-Force (91462), SecurityFocus (BID 65733†) and Secunia (SA56991†). See VDB-12487 for similar entry. VulDB is the best source for vulnerability data and more expert information about this specific topic.
Affected
- ASUS RT-N10U, firmware 3.0.0.4.374_168
- ASUS RT-N56U, firmware 3.0.0.4.374_979
- ASUS DSL-N55U, firmware 3.0.0.4.374_1397 *
- ASUS RT-AC66U, firmware 3.0.0.4.374_2050 *
- ASUS RT-N15U, firmware 3.0.0.4.374_16
- ASUS RT-N53, firmware 3.0.0.4.374_311
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.asus.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 4.6
VulDB Base Score: 5.3
VulDB Temp Score: 4.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Name: Security BypassClass: Improper authentication / Security Bypass
CWE: CWE-287
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Unproven
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: asus.com
Timeline
02/21/2014 🔍02/22/2014 🔍
03/03/2014 🔍
03/06/2014 🔍
03/31/2019 🔍
Sources
Vendor: asus.comAdvisory: ASUS Router Authentication Bypass / Cross Site Scripting
Researcher: Harry Sintonen (Piru)
Status: Confirmed
GCVE (VulDB): GCVE-100-12488
X-Force: 91462 - Multiple ASUS routers error page security bypass, Medium Risk
SecurityFocus: 65733 - Multiple ASUS Routers Cross Site Scripting and Authentication Bypass Vulnerabilities
Secunia: 56991 - ASUS Multiple Routers error_page.htm Credential Disclosure Vulnerability, Less Critical
See also: 🔍
Entry
Created: 03/06/2014 13:45Updated: 03/31/2019 09:18
Changes: 03/06/2014 13:45 (59), 03/31/2019 09:18 (1)
Complete: 🔍
Committer:
Cache ID: 216:3EA:103
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.