Executive Summary
Summary | |
---|---|
Title | ASUS RT-N56U remote password disclosure vulnerability |
Informations | |||
---|---|---|---|
Name | VU#200814 | First vendor Publication | 2011-08-25 |
Vendor | VU-CERT | Last vendor Modification | 2011-08-26 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:A/AC:L/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 3.3 | Attack Range | Adjacent network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 6.5 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#200814ASUS RT-N56U remote password disclosure vulnerabilityOverviewASUS's Wireless-N Gigabit Router RT-N56U is vulnerable to remote administrator password disclosure.I. DescriptionASUS's Wireless-N Gigabit Router RT-N56U contains a vulnerability which may allow a remote unauthenticated attacker to recover the device's administrator password. An attacker with network access to the device can navigate to the web page http://RouterIPAddress/QIS_wizard.htm?flag=detect. The attacker will be presented with a web page containing the device's configuration without entering any login credentials. This web page will display the device's administrator password. The default configuration for this device is to only allow clients connected to the Local Area Network (LAN) to access the system web interface.This vulnerability has been reported in ASUS's Wireless-N Gigabit Router RT-N56U firmware version 1.0.1.4. This vulnerability has been addressed in ASUS's Wireless-N Gigabit Router RT-N56U firmware version 1.0.1.4o.
Referenceshttp://www.asus.com/Networks/Wireless_Routers/RTN56U/ Thanks to Plucky for reporting this vulnerability. This document was written by Michael Orlando.
|
Original Source
Url : http://www.kb.cert.org/vuls/id/200814 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-200 | Information Exposure |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 4 | |
Hardware | 1 | |
Os | 3 |
OpenVAS Exploits
Date | Description |
---|---|
2011-08-26 | Name : ASUS RT-N56U Wireless Router 'QIS_wizard.htm' Password Information Disclosure... File : nvt/gb_asus_rt-n56u_49308.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
74909 | ASUS RT-N56U Wireless Router QIS_wizard.htm Access Restriction Weakness Infor... |