First published: Fri Apr 22 2022(Updated: )
ASUS WebStorage has a hardcoded API Token in the APP source code. An unauthenticated remote attacker can use this token to establish connections with the server and carry out login attempts to general user accounts. A successful login to a general user account allows the attacker to access, modify or delete this user account information.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Asus Webstorage | <3.10.2 |
Update ASUS WebStorage Android version to 3.10.2
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for ASUS WebStorage is CVE-2022-26672.
The severity rating of CVE-2022-26672 is critical with a rating of 9.8.
The affected software for CVE-2022-26672 is Asus Webstorage up to version 3.10.2 for Android.
The CWE ID for CVE-2022-26672 is CWE-798.
An unauthenticated remote attacker can exploit CVE-2022-26672 by using the hardcoded API Token in the ASUS WebStorage APP source code to establish connections with the server and carry out login attempts to general user accounts.