what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ASUS Authentication Bypass / File Disclosure

ASUS Authentication Bypass / File Disclosure
Posted Feb 9, 2014
Authored by Kyle Lovett

ASUS routers are vulnerable to authetnnication bypass and sensitive file disclosure vulnerabilities.

tags | advisory, vulnerability, bypass, info disclosure
SHA-256 | 1821f52b283817610673596a7d3b56a3508d4306d82118292130a704086d8da1

ASUS Authentication Bypass / File Disclosure

Change Mirror Download
ASUS routers, which are enabled with the AiCloud service (SSL ports),
are vulnerable to bypass of authentication and sensitive file
disclosure. This vulnerability has been observed in all firmware
versions, though the latest version increases the complexity of the
attack. By sending a special crafted packet, an attacker can exploit a
weakness in the software by calling a non existent file /smb.xml. This
attack leads to sensitive path disclosure and directory traversal.

On the latest 3.0.0.4.374.2xxx firmware versions, specifically in the
the 66 and 68 series routers, have shown a weakness that may allow an
attacker to exploit the /smb.xml vulnerability with a specially
crafted packet to cause a short term denial of service to the AiCloud
service.

The full details were disclosed to the Vendor last month. There are no
known patches or workarounds at this time other than turning off any
remote access to the AiCloud service.

This is not directly related to the clear text password disclosure
made last July. Also, it is strongly advised that the password to the
administrative side of the router be changed from the default, since
hijacking the routers VPN service becomes trivial once access to the
admin console is obtained.

RT-AC68U Dual-band Wireless-AC1900 Gigabit Router
RT-AC66R Dual-Band Wireless-AC1750 Gigabit Router
RT-AC66U Dual-Band Wireless-AC1750 Gigabit Router
RT-N66R Dual-Band Wireless-N900 Gigabit Router
RT-N66U Dual-Band Wireless-N900 Gigabit Router
RT-AC56U Dual-Band Wireless-AC1200 Gigabit Router
RT-N56R Dual-Band Wireless-AC1200 Gigabit Router
RT-N56U Dual-Band Wireless-AC1200 Gigabit Router
RT-N14U Wireless-N300 Cloud Router
RT-N14UHP Wireless-N300 Cloud Router
RT-N16 Wireless-N300 Gigabit Router
RT-N16R Wireless-N300 Gigabit Router

Access Vector: Remote
Access Complexity: High
Authentication: None
Confidentiality Impact: Partial
Availability Impact: Partial

CWE-400: Uncontrolled Resource Consumption
CWE-208 Information Exposure Through Timing Discrepancy
CWE-211 Information Exposure Through Externally-Generated Error Message
CWE-289 Authentication Bypass by Alternate Name

Product Pages:

http://www.asus.com/Networking/
http://www.asus.com/support/

Research Contact - K Lovett
Discovered - January, 2014
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close