Executive Summary

Summary
Title ASUS RT-N10E Wireless Router vulnerable to authentication bypass
Informations
Name VU#984366 First vendor Publication 2013-10-04
Vendor VU-CERT Last vendor Modification 2013-10-04
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:A/AC:L/Au:N/C:C/I:N/A:N)
Cvss Base Score 6.1 Attack Range Adjacent network
Cvss Impact Score 6.9 Attack Complexity Low
Cvss Expoit Score 6.5 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#984366

ASUS RT-N10E Wireless Router vulnerable to authentication bypass

Original Release date: 04 Oct 2013 | Last revised: 04 Oct 2013

Overview

ASUS RT-N10E Wireless Routers contain an authentication bypass vulnerability (CWE-592).

Description

CWE-592: Authentication Bypass Issues

ASUS RT-N10E Wireless Routers contain an authentication bypass vulnerability. An attacker with network access to the device can navigate to the web page http://RouterIPAddress/qis/QIS_finish.htm  The attacker will be presented with a web page containing the device's configuration without entering any login credentials. This web page will display the device's administrator password. The default configuration for this device is to only allow clients connected to the Local Area Network (LAN) to access the system web interface.

This vulnerability has been reported in ASUS Wireless-N150 Router RT-N10E firmware versions 2.0.0.24 and earlier.

Impact

An unauthenticated attacker that is connected to router's LAN may be able to retrieve the device's administrator password, allowing them to directly access the device's configuration page.

Solution

Apply an Update
Asus has released firmware version 2.0.0.25 to address this vulnerability. If an update is not possible, please consider the following workarounds.

Restrict network access

Restrict network access to the ASUS Wireless-N150 Router RT-N10E system web interface and other devices using open protocols like HTTP.

Disable WAN device management

Restrict network access to the ASUS Wireless-N150 Router RT-N10E system web interface from Internet connections.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
AsusTek Computer Inc.Affected19 Aug 201304 Oct 2013
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base5.6AV:L/AC:L/Au:N/C:C/I:P/A:N
Temporal4.6E:F/RL:OF/RC:C
Environmental1.2CDP:ND/TD:L/CR:ND/IR:ND/AR:ND

References

  • http://cwe.mitre.org/data/definitions/592.html
  • http://www.asus.com/Networking/RTN10E/
  • http://www.asus.com/Networking/RTN10E/#support_Download

Credit

Thanks to Sanket Karalkar for reporting this vulnerability.

This document was written by Adam Rauf.

Other Information

  • CVE IDs:CVE-2013-3610
  • Date Public:04 Oct 2013
  • Date First Published:04 Oct 2013
  • Date Last Updated:04 Oct 2013
  • Document Revision:19

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/984366

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-287 Improper Authentication

CPE : Common Platform Enumeration

TypeDescriptionCount
Hardware 1
Os 6

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2013-10-07 21:25:27
  • Multiple Updates
2013-10-05 17:22:37
  • Multiple Updates
2013-10-04 17:20:31
  • First insertion