Lucene search

K
vulnrichmentTwcertVULNRICHMENT:CVE-2024-3079
HistoryJun 14, 2024 - 2:32 a.m.

CVE-2024-3079 ASUS Router - Stack-based Buffer Overflow

2024-06-1402:32:21
CWE-121
twcert
github.com
5
asus
router
buffer overflow
vulnerability
remote attackers
administrative privileges

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

8.4 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.0%

Certain models of ASUS routers have buffer overflow vulnerabilities, allowing remote attackers with administrative privileges to execute arbitrary commands on the device.

CNA Affected

[
  {
    "vendor": "ASUS",
    "product": "ZenWiFi XT8",
    "versions": [
      {
        "status": "affected",
        "version": "earlier",
        "versionType": "custom",
        "lessThanOrEqual": "3.0.0.4.388_24609"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "vendor": "ASUS",
    "product": "ZenWiFi XT8 V2",
    "versions": [
      {
        "status": "affected",
        "version": "earlier",
        "versionType": "custom",
        "lessThanOrEqual": "3.0.0.4.388_24609"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "vendor": "ASUS",
    "product": "RT-AX88U",
    "versions": [
      {
        "status": "affected",
        "version": "earlier",
        "versionType": "custom",
        "lessThanOrEqual": "3.0.0.4.388_24198"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "vendor": "ASUS",
    "product": "RT-AX58U",
    "versions": [
      {
        "status": "affected",
        "version": "earlier",
        "versionType": "custom",
        "lessThanOrEqual": "3.0.0.4.388_23925"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "vendor": "ASUS",
    "product": "RT-AX57",
    "versions": [
      {
        "status": "affected",
        "version": "earlier",
        "versionType": "custom",
        "lessThanOrEqual": "3.0.0.4.386_52294"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "vendor": "ASUS",
    "product": "RT-AC86U",
    "versions": [
      {
        "status": "affected",
        "version": "earlier",
        "versionType": "custom",
        "lessThanOrEqual": "3.0.0.4.386_51915"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "vendor": "ASUS",
    "product": "RT-AC68U",
    "versions": [
      {
        "status": "affected",
        "version": "earlier",
        "versionType": "custom",
        "lessThanOrEqual": "3.0.0.4.386_51668"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

8.4 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.0%

Related for VULNRICHMENT:CVE-2024-3079