First published: Tue Jun 13 2023(Updated: )
ASUS Router RT-AX3000 Firmware versions prior to 3.0.0.4.388.23403 uses sensitive cookies without 'Secure' attribute. When an attacker is in a position to be able to mount a man-in-the-middle attack, and a user is tricked to log into the affected device through an unencrypted ('http') connection, the user's session may be hijacked.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
ASUS RT-AX3000 firmware | <3.0.0.4.388.23403 | |
ASUS RT-AX3000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this ASUS Router firmware vulnerability is CVE-2023-31195.
The severity rating of CVE-2023-31195 is medium with a score of 5.3.
The vulnerability allows an attacker in a man-in-the-middle position to intercept sensitive cookies when a user logs into the affected device over an unencrypted ('http') connection.
This vulnerability allows an attacker to intercept sensitive information, such as login credentials, by exploiting the insecure use of cookies.
To fix the vulnerability, update the firmware to version 3.0.0.4.388.23403 or higher, which includes the 'Secure' attribute for sensitive cookies.