search menu icon-carat-right cmu-wordmark

CERT Coordination Center

ASUS RT-N56U remote password disclosure vulnerability

Vulnerability Note VU#200814

Original Release Date: 2011-08-25 | Last Revised: 2011-08-26

Overview

ASUS's Wireless-N Gigabit Router RT-N56U is vulnerable to remote administrator password disclosure.

Description

ASUS's Wireless-N Gigabit Router RT-N56U contains a vulnerability which may allow a remote unauthenticated attacker to recover the device's administrator password. An attacker with network access to the device can navigate to the web page http://RouterIPAddress/QIS_wizard.htm?flag=detect. The attacker will be presented with a web page containing the device's configuration without entering any login credentials. This web page will display the device's administrator password. The default configuration for this device is to only allow clients connected to the Local Area Network (LAN) to access the system web interface.

This vulnerability has been reported in ASUS's Wireless-N Gigabit Router RT-N56U firmware version 1.0.1.4.

Impact

An unauthenticated attacker that is connected to the router's LAN may be able to retrieve the device's administrator password allowing them to directly access the device's configuration web page.

Solution

Update
This vulnerability has been addressed in ASUS's Wireless-N Gigabit Router RT-N56U firmware version 1.0.1.4o.


Restrict network access

Restrict network access to the ASUS's Wireless-N Gigabit Router RT-N56U system web interface and other devices using open protocols like HTTP.

Disable WAN device management

Restrict network access to the ASUS's Wireless-N Gigabit Router RT-N56U system web interface from external connections.

Vendor Information

200814
 

AsusTek Computer Inc. Affected

Updated:  August 23, 2011

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Plucky for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

CVE IDs: None
Severity Metric: 1.86
Date Public: 2011-08-25
Date First Published: 2011-08-25
Date Last Updated: 2011-08-26 19:03 UTC
Document Revision: 13

Sponsored by CISA.