Multiple vulnerabilities in ASUS RT-AC1900P router



Published: 2020-07-24
Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2020-15498
CVE-2020-15499
CWE-ID CWE-295
CWE-79
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
RT-AC1900P
Hardware solutions / Routers for home users

Vendor Asus

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Improper Certificate Validation

EUVDB-ID: #VU31815

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-15498

CWE-ID: CWE-295 - Improper Certificate Validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a man-in-the-middle (MitM) attack.

The vulnerability exists due to a missing certification validation within the downloading firmware updates. A remote attacker can perform a man-in-the-middle attack and gain access to sensitive information on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

RT-AC1900P: 3.0.0.4.385_10000-gd8ccd3c


CPE2.3 External links

http://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=27440

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

2) Cross-site scripting

EUVDB-ID: #VU31816

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-15499

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in firmware release notes dialog in the router management web interface. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

RT-AC1900P: 3.0.0.4.385_10000-gd8ccd3c


CPE2.3 External links

http://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=27440

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###