Vulnerability Name:

CVE-2017-15653 (CCN-137728)

Assigned:2017-10-19
Published:2018-01-14
Updated:2018-02-27
Summary:Improper administrator IP validation after his login in the HTTPd server in all current versions (<= 3.0.0.4.380.7743) of Asus asuswrt allows an unauthorized user to execute any action knowing administrator session token by using a specific User-Agent string.
CVSS v3 Severity:8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
8.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)
7.2 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.1 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:S/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-613
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2017-15653

Source: MISC
Type: Third Party Advisory, VDB Entry
http://packetstormsecurity.com/files/145921/ASUSWRT-3.0.0.4.382.18495-Session-Hijacking-Information-Disclosure.html

Source: CCN
Type: Full-Disclosure Mailing List, Sun, 14 Jan 2018 23:47:42 +0100
Multiple vulnerabilities in all versions of ASUS routers

Source: FULLDISC
Type: Mailing List, Third Party Advisory
20180116 Multiple vulnerabilities in all versions of ASUS routers

Source: XF
Type: UNKNOWN
asus-cve201715653-weak-security(137728)

Source: CCN
Type: Packet Storm Security [01-16-2018]
ASUSWRT 3.0.0.4.382.18495 Session Hijacking / Information Disclosure

Source: CCN
Type: ASUS Web site
ASUSWRT

Vulnerable Configuration:Configuration 1:
  • cpe:/a:asus:asuswrt:*:*:*:*:*:*:*:* (Version <= 3.0.0.4.380.7743)

  • Configuration CCN 1:
  • cpe:/a:asus:asuswrt:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    asus asuswrt *
    asus asuswrt *