Article Details

Scrape Timestamp (UTC): 2024-06-17 14:43:18.730

Source: https://thehackernews.com/2024/06/asus-patches-critical-authentication.html

Original Article Text

Click to Toggle View

ASUS Patches Critical Authentication Bypass Flaw in Multiple Router Models. ASUS has shipped software updates to address a critical security flaw impacting its routers that could be exploited by malicious actors to bypass authentication. Tracked as CVE-2024-3080, the vulnerability carries a CVSS score of 9.8 out of a maximum of 10.0. "Certain ASUS router models have authentication bypass vulnerability, allowing unauthenticated remote attackers to log in the device," according to a description of the flaw shared by the Taiwan Computer Emergency Response Team / Coordination Center (TWCERT/CC). Also patched by the Taiwanese company is a high-severity buffer overflow flaw tracked as CVE-2024-3079 (CVSS score: 7.2) that could be weaponized by remote attackers with administrative privileges to execute arbitrary commands on the device. In a hypothetical attack scenario, a bad actor could fashion CVE-2024-3080 and CVE-2024-3079 into an exploit chain in order to sidestep authentication and execute malicious code on susceptible devices. Both the shortcomings impact the following products - Earlier this January, ASUS patched another critical vulnerability tracked as (CVE-2024-3912, CVSS score: 9.8) that could permit an unauthenticated remote attacker to upload arbitrary files and execute system commands on the device. Users of affected routers are advised to update to the latest version to secure against potential threats. Continuous Attack Surface Discovery & Penetration Testing Continuously discover, prioritize, & mitigate exposures with evidence-backed ASM, Pentesting, and Red Teaming.

Daily Brief Summary

MALWARE // ASUS Addresses Critical Security Flaws in Router Software

ASUS has released updates for critical security vulnerabilities in its routers, notably CVE-2024-3080 with a high-risk score of 9.8.

The flaw allows unauthenticated remote attackers to bypass authentication mechanisms on some router models.

Another related high-severity vulnerability, CVE-2024-3079 (CVSS score: 7.2), enables attackers with admin privileges to run arbitrary commands.

An exploit chain using both CVE-2024-3080 and CVE-2024-3079 could allow attackers to bypass security and execute malicious code.

Additional vulnerabilities, such as CVE-2024-3912, were patched by ASUS in January, which could let attackers upload files and execute commands remotely.

Users are urged to update their router software to the latest version to protect against these security threats.

The updated security measures are part of ASUS's ongoing efforts to maintain strong cybersecurity defenses in its devices.