📜 ⬆️ ⬇️

Critical vulnerability of many Asus routers

According to security expert Kyle Lovett on the Bugtraq mailing list, a critical vulnerability is present in many ASUS routers and can be used to get full remote control. The weak point is the AiCloud media server. If activated, unauthorized users can access critical system files via the Internet, including files that contain account data.


Attackers can use this data to access personal files stored on any devices that are connected to the router via USB. Also through AiCloud access to network folders on other computers in the router's network is possible.

According to Lovett, the vulnerability allows access to system files, which allows attackers to perform actions such as creating VPN tunnels. Attackers can gain access to all network traffic passing through the router.
')
Reportedly, the vulnerability is present in the models:
RT-AC66R
RT-AC66U
RT-N66R
RT-N66U
RT-AC56U
RT-N56R
RT-N56U
RT-N14U
RT-N16
RT-N16R

In Heise Security, they were able to access account data on RT-N66U models with the latest firmware version installed (version 3.0.0.4.370).

In June, Lovett told the details of some of the vulnerabilities, and explained this by saying that he was not satisfied with the response from ASUS. According to Lovett, since then ASUS has made no effort to warn affected users. In June, he criticized the fact that the firmware was based on the Linux 2.6.22.19 kernel, which dates back to 2007, and other tools are also outdated.

In March, another researcher reported that full access to the system files could be available on RT-N66U through the Samba server and that UPnP exposes it to potential attacks via the Internet.

While ASUS does not provide secure firmware versions, users of vulnerable devices should disable AiCloud via the web interface menu. This ensures that the vulnerability of this media server will no longer be available when moving to the IP address of the router via HTTPS. Security expert Lovett also advises users to disable UPnP and any other remote access features and change the password of the router.

On the Heise Security request, ASUS stated that updates on the support page are available for the RT-AC66U and RT-N66U routers. The company claims that “soon” it will provide updates for other routers with this vulnerability. At the same time, ASUS recommends disabling all AiCloud functions , including Cloud Disk, Smart Access and Smart Sync.

Source: https://habr.com/ru/post/187018/


All Articles