CVE-2024-3912 (GCVE-0-2024-3912)
Vulnerability from cvelistv5 – Published: 2024-06-14 09:29 – Updated: 2024-08-01 20:26
VLAI?
Summary
Certain models of ASUS routers have an arbitrary firmware upload vulnerability. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary system commands on the device.
Severity ?
9.8 (Critical)
CWE
- CWE-434 - Unrestricted Upload of File with Dangerous Type
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ASUS | DSL-N17U |
Affected:
earlier , < 1.1.2.3_792
(custom)
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:asus:dsl-n55u_d1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n17u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n55u_c1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n66u_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "dsl-n66u_firmware",
"vendor": "asus",
"versions": [
{
"lessThan": "1.1.2.3_792",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:asus:dsl-n14u_b1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n14u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n12u_c1_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "dsl-n12u_c1_firmware",
"vendor": "asus",
"versions": [
{
"lessThan": "1.1.2.3_807",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:asus:dsl-ac56u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-ac55u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-ac52u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-ac750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-ac51_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n16p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n10p_c1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n10_d1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-ac52_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-ac55_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "dsl-ac55_firmware",
"vendor": "asus",
"versions": [
{
"lessThan": "1.1.2.3_999",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:asus:dsl-n16p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n10p_c1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n10_d1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-ac52_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-ac55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n16_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n12e_c1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n10_c1_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dsl-n10_c1_firmware",
"vendor": "asus",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-3912",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-06-27T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-28T03:55:21.068Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T20:26:57.193Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"third-party-advisory",
"x_transferred"
],
"url": "https://www.twcert.org.tw/tw/cp-132-7875-872d3-1.html"
},
{
"tags": [
"third-party-advisory",
"x_transferred"
],
"url": "https://www.twcert.org.tw/en/cp-139-7876-396bd-2.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "DSL-N17U",
"vendor": "ASUS",
"versions": [
{
"lessThan": "1.1.2.3_792",
"status": "affected",
"version": "earlier",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DSL-N55U_C1",
"vendor": "ASUS",
"versions": [
{
"lessThan": "1.1.2.3_792",
"status": "affected",
"version": "earlier",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DSL-N55U_D1",
"vendor": "ASUS",
"versions": [
{
"lessThan": "1.1.2.3_792",
"status": "affected",
"version": "earlier",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DSL-N66U",
"vendor": "ASUS",
"versions": [
{
"lessThan": "1.1.2.3_792",
"status": "affected",
"version": "earlier",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DSL-N12U_C1",
"vendor": "ASUS",
"versions": [
{
"lessThan": "1.1.2.3_807",
"status": "affected",
"version": "earlier",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DSL-N12U_D1",
"vendor": "ASUS",
"versions": [
{
"lessThan": "1.1.2.3_807",
"status": "affected",
"version": "earlier",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DSL-N14U",
"vendor": "ASUS",
"versions": [
{
"lessThan": "1.1.2.3_807",
"status": "affected",
"version": "earlier",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DSL-N14U_B1",
"vendor": "ASUS",
"versions": [
{
"lessThan": "1.1.2.3_807",
"status": "affected",
"version": "earlier",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DSL-N16",
"vendor": "ASUS",
"versions": [
{
"lessThan": "1.1.2.3_999",
"status": "affected",
"version": "earlier",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DSL-AC51",
"vendor": "ASUS",
"versions": [
{
"lessThan": "1.1.2.3_999",
"status": "affected",
"version": "earlier",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DSL-AC750",
"vendor": "ASUS",
"versions": [
{
"lessThan": "1.1.2.3_999",
"status": "affected",
"version": "earlier",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DSL-AC52U",
"vendor": "ASUS",
"versions": [
{
"lessThan": "1.1.2.3_999",
"status": "affected",
"version": "earlier",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DSL-AC55U",
"vendor": "ASUS",
"versions": [
{
"lessThan": "1.1.2.3_999",
"status": "affected",
"version": "earlier",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DSL-AC56U",
"vendor": "ASUS",
"versions": [
{
"lessThan": "1.1.2.3_999",
"status": "affected",
"version": "earlier",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DSL-N10_C1",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "All"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DSL-N10_D1",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "All"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DSL-N10P_C1",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "All"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DSL-N12E_C1",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "All"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DSL-N16P",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "All"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DSL-N16U",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "All"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DSL-AC52",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "All"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DSL-AC55",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "All"
}
]
}
],
"datePublic": "2024-06-14T09:28:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Certain models of ASUS routers have an arbitrary firmware upload vulnerability. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary system commands on the device."
}
],
"value": "Certain models of ASUS routers have an arbitrary firmware upload vulnerability. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary system commands on the device."
}
],
"impacts": [
{
"capecId": "CAPEC-17",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-17 Using Malicious Files"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-434",
"description": "CWE-434 Unrestricted Upload of File with Dangerous Type",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-06-14T10:57:26.604Z",
"orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e",
"shortName": "twcert"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://www.twcert.org.tw/tw/cp-132-7875-872d3-1.html"
},
{
"tags": [
"third-party-advisory"
],
"url": "https://www.twcert.org.tw/en/cp-139-7876-396bd-2.html"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Update following models to version 1.1.2.3_792 or later\uff1a\u003cbr\u003eDSL-N17U, DSL-N55U_C1, DSL-N55U_D1, DSL-N66U\u003cbr\u003e\u003cbr\u003eUpdate following models to version 1.1.2.3_807 or later\uff1a\u003cbr\u003eDSL-N12U_C1, DSL-N12U_D1, DSL-N14U, DSL-N14U_B1\u003cbr\u003e\u003cbr\u003eUpdate following models to version 1.1.2.3_999 or later\uff1a\u003cbr\u003eDSL-N16, DSL-AC51, DSL-AC750, DSL-AC52U, DSL-AC55U, DSL-AC56U\u003cbr\u003e\u003cbr\u003eThe following models are no longer maintained, and it is recommended to retire and replace them.\u003cbr\u003eDSL-N10_C1, DSL-N10_D1, DSL-N10P_C1, DSL-N12E_C1, ,DSL-N16P, DSL-N16U, DSL-AC52, DSL-AC55\u003cbr\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIf replacement is not possible in the short term, it is recommended to disable remote access (Web access from WAN), virtual servers (Port forwarding), DDNS, VPN server, DMZ, and port trigger.\u003c/span\u003e\n\n\u003cbr\u003e"
}
],
"value": "Update following models to version 1.1.2.3_792 or later\uff1a\nDSL-N17U, DSL-N55U_C1, DSL-N55U_D1, DSL-N66U\n\nUpdate following models to version 1.1.2.3_807 or later\uff1a\nDSL-N12U_C1, DSL-N12U_D1, DSL-N14U, DSL-N14U_B1\n\nUpdate following models to version 1.1.2.3_999 or later\uff1a\nDSL-N16, DSL-AC51, DSL-AC750, DSL-AC52U, DSL-AC55U, DSL-AC56U\n\nThe following models are no longer maintained, and it is recommended to retire and replace them.\nDSL-N10_C1, DSL-N10_D1, DSL-N10P_C1, DSL-N12E_C1, ,DSL-N16P, DSL-N16U, DSL-AC52, DSL-AC55\n\n\nIf replacement is not possible in the short term, it is recommended to disable remote access (Web access from WAN), virtual servers (Port forwarding), DDNS, VPN server, DMZ, and port trigger."
}
],
"source": {
"advisory": "TVN-202406011",
"discovery": "EXTERNAL"
},
"title": "ASUS Router - Upload arbitrary firmware",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e",
"assignerShortName": "twcert",
"cveId": "CVE-2024-3912",
"datePublished": "2024-06-14T09:29:00.161Z",
"dateReserved": "2024-04-17T07:06:03.258Z",
"dateUpdated": "2024-08-01T20:26:57.193Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"Certain models of ASUS routers have an arbitrary firmware upload vulnerability. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary system commands on the device.\"}, {\"lang\": \"es\", \"value\": \"Ciertos modelos de enrutadores ASUS tienen una vulnerabilidad de carga de firmware arbitraria. Un atacante remoto no autenticado puede aprovechar esta vulnerabilidad para ejecutar comandos arbitrarios del sistema en el dispositivo.\"}]",
"id": "CVE-2024-3912",
"lastModified": "2024-11-21T09:30:41.027",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"twcert@cert.org.tw\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}]}",
"published": "2024-06-14T10:15:10.513",
"references": "[{\"url\": \"https://www.twcert.org.tw/en/cp-139-7876-396bd-2.html\", \"source\": \"twcert@cert.org.tw\"}, {\"url\": \"https://www.twcert.org.tw/tw/cp-132-7875-872d3-1.html\", \"source\": \"twcert@cert.org.tw\"}, {\"url\": \"https://www.twcert.org.tw/en/cp-139-7876-396bd-2.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.twcert.org.tw/tw/cp-132-7875-872d3-1.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "twcert@cert.org.tw",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"twcert@cert.org.tw\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-434\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-3912\",\"sourceIdentifier\":\"twcert@cert.org.tw\",\"published\":\"2024-06-14T10:15:10.513\",\"lastModified\":\"2024-11-21T09:30:41.027\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Certain models of ASUS routers have an arbitrary firmware upload vulnerability. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary system commands on the device.\"},{\"lang\":\"es\",\"value\":\"Ciertos modelos de enrutadores ASUS tienen una vulnerabilidad de carga de firmware arbitraria. Un atacante remoto no autenticado puede aprovechar esta vulnerabilidad para ejecutar comandos arbitrarios del sistema en el dispositivo.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"twcert@cert.org.tw\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"twcert@cert.org.tw\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-434\"}]}],\"references\":[{\"url\":\"https://www.twcert.org.tw/en/cp-139-7876-396bd-2.html\",\"source\":\"twcert@cert.org.tw\"},{\"url\":\"https://www.twcert.org.tw/tw/cp-132-7875-872d3-1.html\",\"source\":\"twcert@cert.org.tw\"},{\"url\":\"https://www.twcert.org.tw/en/cp-139-7876-396bd-2.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.twcert.org.tw/tw/cp-132-7875-872d3-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.twcert.org.tw/tw/cp-132-7875-872d3-1.html\", \"tags\": [\"third-party-advisory\", \"x_transferred\"]}, {\"url\": \"https://www.twcert.org.tw/en/cp-139-7876-396bd-2.html\", \"tags\": [\"third-party-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T20:26:57.193Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-3912\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-06-14T17:16:34.692655Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:o:asus:dsl-n55u_d1_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:asus:dsl-n17u_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:asus:dsl-n55u_c1_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:asus:dsl-n66u_firmware:-:*:*:*:*:*:*:*\"], \"vendor\": \"asus\", \"product\": \"dsl-n66u_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"1.1.2.3_792\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:h:asus:dsl-n14u_b1:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:asus:dsl-n14u_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:asus:dsl-n12u_c1_firmware:-:*:*:*:*:*:*:*\"], \"vendor\": \"asus\", \"product\": \"dsl-n12u_c1_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"1.1.2.3_807\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:o:asus:dsl-ac56u_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:asus:dsl-ac55u_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:asus:dsl-ac52u_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:asus:dsl-ac750_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:asus:dsl-ac51_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:asus:dsl-n16p_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:asus:dsl-n10p_c1_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:asus:dsl-n10_d1_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:asus:dsl-ac52_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:asus:dsl-ac55_firmware:-:*:*:*:*:*:*:*\"], \"vendor\": \"asus\", \"product\": \"dsl-ac55_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"1.1.2.3_999\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:o:asus:dsl-n16p_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:asus:dsl-n10p_c1_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:asus:dsl-n10_d1_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:asus:dsl-ac52_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:asus:dsl-ac55_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:asus:dsl-n16_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:asus:dsl-n12e_c1_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:asus:dsl-n10_c1_firmware:-:*:*:*:*:*:*:*\"], \"vendor\": \"asus\", \"product\": \"dsl-n10_c1_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"*\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-14T17:31:19.250Z\"}}], \"cna\": {\"title\": \"ASUS Router - Upload arbitrary firmware\", \"source\": {\"advisory\": \"TVN-202406011\", \"discovery\": \"EXTERNAL\"}, \"impacts\": [{\"capecId\": \"CAPEC-17\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-17 Using Malicious Files\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"ASUS\", \"product\": \"DSL-N17U\", \"versions\": [{\"status\": \"affected\", \"version\": \"earlier\", \"lessThan\": \"1.1.2.3_792\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"DSL-N55U_C1\", \"versions\": [{\"status\": \"affected\", \"version\": \"earlier\", \"lessThan\": \"1.1.2.3_792\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"DSL-N55U_D1\", \"versions\": [{\"status\": \"affected\", \"version\": \"earlier\", \"lessThan\": \"1.1.2.3_792\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"DSL-N66U\", \"versions\": [{\"status\": \"affected\", \"version\": \"earlier\", \"lessThan\": \"1.1.2.3_792\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"DSL-N12U_C1\", \"versions\": [{\"status\": \"affected\", \"version\": \"earlier\", \"lessThan\": \"1.1.2.3_807\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"DSL-N12U_D1\", \"versions\": [{\"status\": \"affected\", \"version\": \"earlier\", \"lessThan\": \"1.1.2.3_807\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"DSL-N14U\", \"versions\": [{\"status\": \"affected\", \"version\": \"earlier\", \"lessThan\": \"1.1.2.3_807\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"DSL-N14U_B1\", \"versions\": [{\"status\": \"affected\", \"version\": \"earlier\", \"lessThan\": \"1.1.2.3_807\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"DSL-N16\", \"versions\": [{\"status\": \"affected\", \"version\": \"earlier\", \"lessThan\": \"1.1.2.3_999\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"DSL-AC51\", \"versions\": [{\"status\": \"affected\", \"version\": \"earlier\", \"lessThan\": \"1.1.2.3_999\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"DSL-AC750\", \"versions\": [{\"status\": \"affected\", \"version\": \"earlier\", \"lessThan\": \"1.1.2.3_999\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"DSL-AC52U\", \"versions\": [{\"status\": \"affected\", \"version\": \"earlier\", \"lessThan\": \"1.1.2.3_999\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"DSL-AC55U\", \"versions\": [{\"status\": \"affected\", \"version\": \"earlier\", \"lessThan\": \"1.1.2.3_999\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"DSL-AC56U\", \"versions\": [{\"status\": \"affected\", \"version\": \"earlier\", \"lessThan\": \"1.1.2.3_999\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"DSL-N10_C1\", \"versions\": [{\"status\": \"affected\", \"version\": \"All\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"DSL-N10_D1\", \"versions\": [{\"status\": \"affected\", \"version\": \"All\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"DSL-N10P_C1\", \"versions\": [{\"status\": \"affected\", \"version\": \"All\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"DSL-N12E_C1\", \"versions\": [{\"status\": \"affected\", \"version\": \"All\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"DSL-N16P\", \"versions\": [{\"status\": \"affected\", \"version\": \"All\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"DSL-N16U\", \"versions\": [{\"status\": \"affected\", \"version\": \"All\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"DSL-AC52\", \"versions\": [{\"status\": \"affected\", \"version\": \"All\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"DSL-AC55\", \"versions\": [{\"status\": \"affected\", \"version\": \"All\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Update following models to version 1.1.2.3_792 or later\\uff1a\\nDSL-N17U, DSL-N55U_C1, DSL-N55U_D1, DSL-N66U\\n\\nUpdate following models to version 1.1.2.3_807 or later\\uff1a\\nDSL-N12U_C1, DSL-N12U_D1, DSL-N14U, DSL-N14U_B1\\n\\nUpdate following models to version 1.1.2.3_999 or later\\uff1a\\nDSL-N16, DSL-AC51, DSL-AC750, DSL-AC52U, DSL-AC55U, DSL-AC56U\\n\\nThe following models are no longer maintained, and it is recommended to retire and replace them.\\nDSL-N10_C1, DSL-N10_D1, DSL-N10P_C1, DSL-N12E_C1, ,DSL-N16P, DSL-N16U, DSL-AC52, DSL-AC55\\n\\n\\nIf replacement is not possible in the short term, it is recommended to disable remote access (Web access from WAN), virtual servers (Port forwarding), DDNS, VPN server, DMZ, and port trigger.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Update following models to version 1.1.2.3_792 or later\\uff1a\u003cbr\u003eDSL-N17U, DSL-N55U_C1, DSL-N55U_D1, DSL-N66U\u003cbr\u003e\u003cbr\u003eUpdate following models to version 1.1.2.3_807 or later\\uff1a\u003cbr\u003eDSL-N12U_C1, DSL-N12U_D1, DSL-N14U, DSL-N14U_B1\u003cbr\u003e\u003cbr\u003eUpdate following models to version 1.1.2.3_999 or later\\uff1a\u003cbr\u003eDSL-N16, DSL-AC51, DSL-AC750, DSL-AC52U, DSL-AC55U, DSL-AC56U\u003cbr\u003e\u003cbr\u003eThe following models are no longer maintained, and it is recommended to retire and replace them.\u003cbr\u003eDSL-N10_C1, DSL-N10_D1, DSL-N10P_C1, DSL-N12E_C1, ,DSL-N16P, DSL-N16U, DSL-AC52, DSL-AC55\u003cbr\u003e\\n\\n\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eIf replacement is not possible in the short term, it is recommended to disable remote access (Web access from WAN), virtual servers (Port forwarding), DDNS, VPN server, DMZ, and port trigger.\u003c/span\u003e\\n\\n\u003cbr\u003e\", \"base64\": false}]}], \"datePublic\": \"2024-06-14T09:28:00.000Z\", \"references\": [{\"url\": \"https://www.twcert.org.tw/tw/cp-132-7875-872d3-1.html\", \"tags\": [\"third-party-advisory\"]}, {\"url\": \"https://www.twcert.org.tw/en/cp-139-7876-396bd-2.html\", \"tags\": [\"third-party-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Certain models of ASUS routers have an arbitrary firmware upload vulnerability. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary system commands on the device.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Certain models of ASUS routers have an arbitrary firmware upload vulnerability. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary system commands on the device.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-434\", \"description\": \"CWE-434 Unrestricted Upload of File with Dangerous Type\"}]}], \"providerMetadata\": {\"orgId\": \"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e\", \"shortName\": \"twcert\", \"dateUpdated\": \"2024-06-14T10:57:26.604Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-3912\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T20:26:57.193Z\", \"dateReserved\": \"2024-04-17T07:06:03.258Z\", \"assignerOrgId\": \"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e\", \"datePublished\": \"2024-06-14T09:29:00.161Z\", \"assignerShortName\": \"twcert\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…