[ad_1]
Anyone reading this website by way of an Asus router should take note—the company has released essential updates for many of its routers. They’re not essential because of some new feature or technology, though. Asus says owners of its routers should install the updates as soon as possible because they address a raft of vulnerabilities that could leave your network and devices exposed.
There are a total of nine security flaws addressed in the updates, and some of them are high-severity and even critical. The most dangerous flaws are CVE-2022-26376 and CVE-2018-1160. The first is a memory corruption bug in the company’s Asuswrt firmware that could allow attackers to manipulate system memory to trigger denial-of-services states or run arbitrary code.
The second critical update, as the CVE code shows, is from 2018. This bug is caused by an out-of-bounds error in the Netatalk protocol, which is used for file sharing with Apple computers. This flaw can be exploited to unlock remote code execution. It might have taken Asus time to realize its routers were vulnerable, but at least there’s an update now.
The security patch rollup is available for more than a dozen Asus routers, including the ZenWifi XT9, TUF Gaming AX6000, ROG Rapture GT-AXE16000, RT-AX86U, and more. See the Asus security advisory page for a full list of models. Asus recommends installing the new firmware as soon as possible. While it doesn’t mention any known exploits targeting Asus routers, disclosing the bugs as part of the update will draw attention from potential attackers. Here’s the full changelog.
-
Fixed CVE-2023-28702, CVE-2023-28703, CVE-2023-31195, CVE-2022-46871, CVE-2022-38105, CVE-2022-35401, CVE-2018-1160, CVE-2022-38393, CVE-2022-26376
-
Fixed DoS vulnerabilities in firewall configuration pages.
-
Fixed DoS vulnerabilities in httpd.
-
Fixed information disclosure vulnerability.
-
Fixed null pointer dereference vulnerabilities.
-
Fixed the cfg server vulnerability.
-
Fixed the vulnerability in the logmessage function.
-
Fixed Client DOM Stored XSS
-
Fixed HTTP response splitting vulnerability
-
Fixed status page HTML vulnerability.
-
Fixed HTTP response splitting vulnerability.
-
Fixed Samba related vulerabilities.
-
Fixed Open redirect vulnerability.
-
Fixed token authentication security issues.
-
Fixed security issues on the status page.
-
Enabled and supported ECDSA certificates for Let’s Encrypt.
-
Enhanced protection for credentials.
-
Enhanced protection for OTA firmware updates
The updates are available from your router’s management page, as well as on the support pages for each model. Plus, Asus has included links for each update in the security advisory. The company really does want to make it easy to update these devices. If you choose not to update, you could be in for a world of hurt—these security holes are no joke, and Asus products have been targeted by botnets in the past.
Even the latest XT9 Asus mesh system is included in the patches.
Credit: Asus
Asus says anyone without the new patch should take extreme measures to protect their network. Basically, you’d have to disable all WAN-side services, including remote access from WAN, port forwarding, DDNA, VPN servers, DMZ, and port trigger.
[ad_2]
Source link