ADVERTISEMENT
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
sabato, Aprile 18, 2026
No Result
View All Result
Global News 24
  • Home
  • World News
  • Business
  • Sports
  • Health
  • Travel
  • Tech
  • Lifestyle
  • Fashion
  • Entertainment
  • Home
  • World News
  • Business
  • Sports
  • Health
  • Travel
  • Tech
  • Lifestyle
  • Fashion
  • Entertainment
No Result
View All Result
Global News 24
No Result
View All Result
Home Tech

High-severity vulnerabilities affect a wide range of Asus router models

by admin
18 Giugno 2024
in Tech
0 0
0
High-severity vulnerabilities affect a wide range of Asus router models
0
SHARES
6
VIEWS
Share on FacebookShare on Twitter
ADVERTISEMENT


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

ADVERTISEMENT


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

ADVERTISEMENT


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

ADVERTISEMENT


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

ADVERTISEMENT


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

ADVERTISEMENT


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

ADVERTISEMENT


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Advertisement. Scroll to continue reading.


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

ADVERTISEMENT


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

ADVERTISEMENT


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

ADVERTISEMENT


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

ADVERTISEMENT


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

ADVERTISEMENT


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

ADVERTISEMENT


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

ADVERTISEMENT


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

ADVERTISEMENT


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

ADVERTISEMENT


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

ADVERTISEMENT


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

ADVERTISEMENT


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

ADVERTISEMENT


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Advertisement. Scroll to continue reading.


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

ADVERTISEMENT


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

ADVERTISEMENT


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

ADVERTISEMENT


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

ADVERTISEMENT


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

ADVERTISEMENT


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

ADVERTISEMENT


High-severity vulnerabilities affect a wide range of Asus router models

Getty Images

Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.

The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:

A favorite haven for hackers

A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.

TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:

Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:

Advertisement

  • DSL-N10_C1
  • DSL-N10_D1
  • DSL-N10P_C1
  • DSL-N12E_C1
  • DSL-N16P
  • DSL-N16U
  • DSL-AC52
  • DSL-AC55

TWCERT/CC advises owners of these devices to replace them.

Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.

There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Tags: affectAsusHighseveritymodelsrangeroutervulnerabilitieswide
admin

admin

Next Post
Longevity Isn’t Just About Optimizing Physical Health—Here Are the Other Things that Count

Longevity Isn’t Just About Optimizing Physical Health—Here Are the Other Things that Count

Lascia un commento Annulla risposta

Il tuo indirizzo email non sarà pubblicato. I campi obbligatori sono contrassegnati *

Popular News

  • After $130 Billion sopra U.S. Aid, Why Israel Can ‘Stand Cerchio’

    After $130 Billion sopra U.S. Aid, Why Israel Can ‘Stand Cerchio’

    0 shares
    Share 0 Tweet 0
  • Dirty Chai – A Beautiful Mess

    0 shares
    Share 0 Tweet 0
  • How Climate Change Is Punishing Asthma Sufferers

    0 shares
    Share 0 Tweet 0
  • Meet Magnus, an Arduino-powered glove that turbocharges your shooting speed

    0 shares
    Share 0 Tweet 0
  • Manchester United make contact with Ipswich principale Kieran McKenna – Paper Talk | Football News

    0 shares
    Share 0 Tweet 0
ADVERTISEMENT

About Us

Welcome to Globalnews24.ch The goal of Globalnews24.ch is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Category

  • Business
  • Entertainment
  • Fashion
  • Health
  • Lifestyle
  • Sports
  • Tech
  • Travel
  • World

Recent Posts

  • ‘Complete annihilation of Microsoft, Nvidia … ‘: Iran warns US after Trump threatens to strike bridges, power plants
  • Company Adds 2M Streaming Households, Hits Key Financial Targets
  • Warner Music Group shake-up: Max Lousada to exit; Elliot Grainge named CEO of Atlantic Music Group, with Julie Greenwald as Chairman
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Copyright © 2024 Globalnews24.ch | All Rights Reserved.

No Result
View All Result
  • Home
  • World News
  • Business
  • Sports
  • Health
  • Travel
  • Tech
  • Lifestyle
  • Fashion
  • Entertainment

Copyright © 2024 Globalnews24.ch | All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In