Headlines

ASUS Urges Router Users: Update Immediately to Secure Networks

ASUS Urges Router Users: Update Immediately to Secure NetworksASUS,router,update,secure,networks

ASUS warns router customers: Patch now, or block all inbound requests

ASUS, a well-known maker of electronics products, has issued a warning to its router customers: update the firmware immediately or block all inbound requests. The company recently released firmware updates for a wide range of its home routers, along with a strong recommendation for users to disable certain services accessible from the Wide Area Network (WAN) side of their routers to avoid potential unwanted intrusions. These services include remote access, port forwarding, DDNS (Dynamic Domain Name System), VPN server, DMZ (Demilitarized Zone), and port trigger.

While ASUS expects potential attackers to start probing exposed devices with the release of the firmware updates, it also acknowledges that there may have been well-informed attackers who were already aware of some or all of these vulnerabilities. However, there have been no reports of zero-day exploits in the wild.

Long-awaited patches for critical vulnerabilities

Two of the vulnerabilities that have been patched in the firmware updates had been waiting to be addressed for a long time. These vulnerabilities had a 9.8/10 “danger score” and a CRITICAL rating in the US National Vulnerability Database (NVD).

  • CVE-2022-26376: This vulnerability involved memory corruption in the httpd unescape functionality. An attacker could exploit this vulnerability by sending a specially-crafted HTTP request to trigger memory corruption.
  • CVE-2018-1160: This vulnerability affected the Netatalk software component, which provides support for Apple-style networking. The lack of bounds checking on attacker-controlled data could allow a remote unauthenticated attacker to achieve arbitrary code execution.

Both of these vulnerabilities had the potential to be exploited from any operating system on any computer with a network connection, even if Apple software or a Macintosh computer was not used.

Other vulnerabilities patched

Aside from the critical vulnerabilities mentioned above, ASUS also patched several other vulnerabilities with high severity ratings:

  • CVE-2022-35401: This vulnerability allowed full administrative access to the device through a specially-crafted HTTP request.
  • CVE-2022-38105: This vulnerability could lead to information disclosure through specially-crafted network packets.
  • CVE-2022-38393: This vulnerability could result in a denial-of-service (DoS) attack when a malicious network packet is sent.
  • CVE-2022-46871: This vulnerability involved potentially exploitable bugs in the open-source libusrsctp library, which is used for the Stream Control Transmission Protocol (SCTP).
  • CVE-2023-28702: This vulnerability allowed remote attackers with normal user privileges to perform command injection attacks and execute arbitrary system commands.
  • CVE-2023-28703: This vulnerability involved buffer overflow and allowed a remote attacker with administrator privileges to execute arbitrary system commands.
  • CVE-2023-31195: This vulnerability allowed session hijacking through the use of sensitive cookies without the Secure attribute set.

One notable vulnerability is CVE-2023-28702, which allows command injection attacks similar to the recently reported MOVEit bugs. This type of attack occurs when a command parameter sent in a web URL is blindly copied and pasted into a system-level command, allowing an attacker to execute arbitrary commands.

Another concerning vulnerability is CVE-2023-31195, which involves session hijacking through the use of insecure (non-HTTPS) connections. This vulnerability can allow an attacker to intercept and impersonate a user’s session.

Importance of prompt patching and secure practices

ASUS customers who own affected routers are strongly advised to patch their devices as soon as possible. The fact that ASUS took a long time to release the patches does not mean that users can delay applying them, especially now that the vulnerabilities are publicly known. If immediate patching is not possible, blocking all inbound access to the router is recommended until the update can be applied.

For developers and programmers, it is crucial to sanitize inputs to prevent command injection bugs and memory overflows. Additionally, timely patching of high-scoring vulnerabilities and careful review of HTTP headers to ensure the use of secure options when exchanging critical data, such as authentication tokens, are essential practices.

Conclusion

Internet security vulnerabilities can pose significant risks to individuals and organizations. Prompt patching and proactive measures to secure networks and devices are essential in minimizing these risks. Manufacturers and developers must prioritize timely release of patches to protect their customers and provide regular updates to address any potential vulnerabilities. Users should remain vigilant, keep their devices up-to-date, and follow security best practices to protect themselves from potential intrusions and attacks.

Cybersecurity-ASUS,router,update,secure,networks


ASUS Urges Router Users: Update Immediately to Secure Networks
<< photo by Roman Synkevych >>
The image is for illustrative purposes only and does not depict the actual situation.

You might want to read !