Critical vulnerabilities in numerous ASUS routers

KIA

KIA

Man of Honour
Joined
14 Nov 2004
Posts
13,771
The weak point is the AiCloud media server. If AiCloud is activated, unauthorised users can access critical system files over the internet – including files containing access credentials for the router in plain text format.

Attackers can use these credentials to access personal files stored on any devices connected to the router's USB ports. Attackers may also be able to use AiCloud to access network shares on other computers on the router's network.

The following models are reported to be affected:

RT-AC66R
RT-AC66U
RT-N66R
RT-N66U
RT-AC56U
RT-N56R
RT-N56U
RT-N14U
RT-N16
RT-N16R

The H's associates at heise Security were able to gain access to plain text access credentials on a model RT-N66U router running the latest firmware (version 3.0.0.4.370)

Until ASUS provides secure firmware versions, users of affected devices should disable the AiCloud function via the menu option in its web interface. This ensures that the vulnerable server is no longer accessible by navigating to the router's IP address over HTTPS. Security expert Lovett is also advising users to disable UPnP services and any remote access options and to change the router password.

http://www.h-online.com/security/ne...ilities-in-numerous-ASUS-routers-1918469.html
 
Back
Top Bottom