CISA KEV 정보
| 취약점명 | ASUS Routers Improper Authentication Vulnerability |
|---|---|
| 설명 | ASUS Lyra Mini and ASUS GT-AC2900 devices contain an improper authentication vulnerability that allows an attacker to gain unauthorized access to the administrative interface. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization. |
| 조치사항 | Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-287 |
| 등록일 (KEV) | 2025-06-02 |
| 조치 기한 | 2025-06-23 |
| 추가 참고 | https://www.asus.com/us/supportonly/lyra%20mini/helpdesk_bios/ ; https://www.asus.com/us/supportonly/rog%20rapture%20gt-ac2900/helpdesk_bios/; https://nvd.nist.gov/vuln/detail/CVE-2021-32030 |
NVD 상세 정보
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HAV:N/AC:L/Au:N/C:P/I:P/A:P설명: The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 and Lyra Mini before 3.0.0.4_384_46630 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_check in web_hook.o. An attacker-supplied value of '\0' matches the device's default value of '\0' in some situations. Note: All versions of Lyra Mini and earlier which are unsupported (End-of-Life, EOL) are also affected by this vulnerability, Consumers can mitigate this vulnerability by disabling the remote access features from WAN.
CWE: CWE-287 | CWE-287
참조
- https://github.com/atredispartners/advisories/blob/master/ATREDIS-2020-0010.md [Broken Link, Exploit, Third Party Advisory]
- https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-Gaming-Routers/RT-AC2900/HelpDesk_BIOS/ [Product]
- https://www.asus.com/us/supportonly/lyra%20mini/helpdesk_bios/ [Product]
- https://www.atredis.com/blog/2021/4/30/asus-authentication-bypass [Exploit]
- https://github.com/atredispartners/advisories/blob/master/ATREDIS-2020-0010.md [Broken Link, Exploit, Third Party Advisory]
- https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-Gaming-Routers/RT-AC2900/HelpDesk_BIOS/ [Product]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-32030 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.