First published: Sun Feb 01 2015(Updated: )
Cross-site request forgery (CSRF) vulnerability on ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earlier, and RT-N56U routers with firmware 3.0.0.4.376.3715 and earlier allows remote attackers to hijack the authentication of arbitrary users.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
ASUS RT-N66U | <=3.0.0.4.376.3715 | |
Asus EA-N66 | ||
ASUS RT-N56U firmware | <=3.0.0.4.376.3715 | |
ASUS routers | ||
ASUS RT-AC87U Firmware | <=3.0.0.4.378.3754 | |
ASUS RT-AC87U Firmware | ||
ASUS RT-AC68R | <=3.0.0.4.376.3715 | |
ASUS 4G-AC68U | ||
ASUS RT-AC56S | <=3.0.0.4.376.3715 | |
ASUS RT-AC56S |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7270 is classified as a medium severity cross-site request forgery (CSRF) vulnerability.
To fix CVE-2014-7270, update the firmware of your affected ASUS router models to the latest version provided by ASUS.
CVE-2014-7270 affects ASUS RT-AC87U, RT-AC68U, RT-AC56S, and RT-N66U routers with specific firmware versions.
The risks of CVE-2014-7270 include unauthorized actions being performed on behalf of a user without their consent.
A temporary workaround for CVE-2014-7270 is to restrict access to the router's web interface to trusted IP addresses only.