AsusWRT.Lan.Unauthorized.Config.Change.Security.Bypass
Description
This indicates an attack attempt to exploit an Security Bypass vulnerability in AsusWRT.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application when handling certain HTTP Post requests. A remote attacker may be able to exploit this to modify the configuration, leading to further attacks.
Affected Products
RT-AC88U 3.0.0.4.384_10007
RT-AC3100 3.0.0.4.384_10007
RT-AC86U 3.0.0.4.384_10007
RT-AC68U series 3.0.0.4.384_10007 , also include RT-AC68U/ 68R/ 68W/ AC1900/ 68U_White/ 68P/ 1900P/ 1900U
RT-AC66U_B1 series 3.0.0.4.384_10007, also include AC1750_B1
Impact
Security Bypass: Remote attackers can bypass security features of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://www.asus.com/Static_WebPage/ASUS-Product-Security-Advisory/
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2019-06-06 | 14.627 | Severity:high:critical |