{"vuid":"VU#984366","idnumber":"984366","name":"ASUS RT-N10E Wireless Router vulnerable to authentication bypass","keywords":["ASUS","privilege bypass","information leakage","wireless","router","password","CWE-592","CVE-2013-3610"],"overview":"ASUS RT-N10E Wireless Routers contain an authentication bypass vulnerability (CWE-592).","clean_desc":"CWE-592: Authentication Bypass Issues\nASUS RT-N10E Wireless Routers contain an authentication bypass vulnerability. An attacker with network access to the device can navigate to the web page http://RouterIPAddress/qis/QIS_finish.htm  The attacker will be presented with a web page containing the device's configuration without entering any login credentials. This web page will display the device's administrator password. The default configuration for this device is to only allow clients connected to the Local Area Network (LAN) to access the system web interface. This vulnerability has been reported in ASUS Wireless-N150 Router RT-N10E firmware versions 2.0.0.24 and earlier.","impact":"An unauthenticated attacker that is connected to router's LAN may be able to retrieve the device's administrator password, allowing them to directly access the device's configuration page.","resolution":"Apply an Update\nASUS has released firmware version 2.0.0.25 to address this vulnerability. If an update is not possible, please consider the following workarounds.","workarounds":"Restrict network access Restrict network access to the ASUS Wireless-N150 Router RT-N10E system web interface and other devices using open protocols like HTTP. Disable WAN device management Restrict network access to the ASUS Wireless-N150 Router RT-N10E system web interface from Internet connections.","sysaffected":"","thanks":"Thanks to Sanket Karalkar for reporting this vulnerability.","author":"This document was written by Adam Rauf.","public":["http://cwe.mitre.org/data/definitions/592.html","http://www.asus.com/Networking/RTN10E/","http://www.asus.com/Networking/RTN10E/#support_Download"],"cveids":["CVE-2013-3610"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2013-07-29T20:08:46Z","publicdate":"2013-10-04T00:00:00Z","datefirstpublished":"2013-10-04T15:00:45Z","dateupdated":"2013-10-04T15:00:45Z","revision":21,"vrda_d1_directreport":"1","vrda_d1_population":"1","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"L","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"P","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"5.6","cvss_basevector":"AV:L/AC:L/Au:N/C:C/I:P/A:N","cvss_temporalscore":"4.6","cvss_environmentalscore":"1.2","cvss_environmentalvector":"CDP:ND/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}