Home page logo
/

bugtraq logo Bugtraq mailing list archives

ASUS AiCloud Enabled Routers 12 Models - Authentication bypass and Sensitive file/path disclosure
From: kyle Lovett <krlovett () gmail com>
Date: Sat, 8 Feb 2014 18:30:15 -0500

ASUS routers, which are enabled with the AiCloud service (SSL ports),
are vulnerable to bypass of authentication and sensitive file
disclosure. This vulnerability has been observed in all firmware
versions, though the latest version increases the complexity of the
attack. By sending a special crafted packet, an attacker can exploit a
weakness in the software by calling a non existent file /smb.xml. This
attack leads to sensitive path disclosure and directory traversal.

On the latest 3.0.0.4.374.2xxx firmware versions, specifically in the
the 66 and 68 series routers, have shown a weakness that may allow an
attacker to exploit the /smb.xml vulnerability with a specially
crafted packet to cause a short term denial of service to the AiCloud
service.

The full details were disclosed to the Vendor last month. There are no
known patches or workarounds at this time other than turning off any
remote access to the AiCloud service.

This is not directly related to the clear text password disclosure
made last July. Also, it is strongly advised that the password to the
administrative side of the router be changed from the default, since
hijacking the routers VPN service becomes trivial once access to the
admin console is obtained.

RT-AC68U Dual-band Wireless-AC1900 Gigabit Router
RT-AC66R Dual-Band Wireless-AC1750 Gigabit Router
RT-AC66U Dual-Band Wireless-AC1750 Gigabit Router
RT-N66R Dual-Band Wireless-N900 Gigabit Router
RT-N66U Dual-Band Wireless-N900 Gigabit Router
RT-AC56U Dual-Band Wireless-AC1200 Gigabit Router
RT-N56R Dual-Band Wireless-AC1200 Gigabit Router
RT-N56U Dual-Band Wireless-AC1200 Gigabit Router
RT-N14U Wireless-N300 Cloud Router
RT-N14UHP Wireless-N300 Cloud Router
RT-N16 Wireless-N300 Gigabit Router
RT-N16R Wireless-N300 Gigabit Router

Access Vector: Remote
Access Complexity: High
Authentication: None
Confidentiality Impact: Partial
Availability Impact: Partial

CWE-400: Uncontrolled Resource Consumption
CWE-208 Information Exposure Through Timing Discrepancy
CWE-211 Information Exposure Through Externally-Generated Error Message
CWE-289 Authentication Bypass by Alternate Name

Product Pages:

http://www.asus.com/Networking/
http://www.asus.com/support/

Research Contact - K Lovett
Discovered - January, 2014


  By Date           By Thread  

Current thread:
  • ASUS AiCloud Enabled Routers 12 Models - Authentication bypass and Sensitive file/path disclosure kyle Lovett (Feb 10)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]