Top ASUS routers are reported to carry serious security flaws that could in fact allow hackers to hijack your device. Three major ASUS models have now been reported to have carried high-severity flaws.
Top ASUS Routers Security Flaws
Cybersecurity researchers have just recently discovered three major vulnerabilities in many high-end ASUS routers, which in case you don’t know could be utilized in hijacking endpoints, disrupting connectivity, and even deploying ransomware and malware.
The routers in question for those that don’t know are ASUS RT-AX55, RT-AX56U_V2, and RT-AC86U. These are all high-end devices that are used by mostly gamers and other individuals with high-performance demands.
The Vulnerabilities Plaguing the Devices
The vulnerabilities that are reportedly plaguing these devices are tracked as CVE-2023-39238, CVE-2023-39239, and CVE-2023-39240. The vulnerabilities in question carry scores between 9.8 and 10.0, and they reportedly affect firmware versions 184.108.40.206.386_50460, 220.127.116.11.386_50460, and 18.104.22.168_386_51529 respectively.
ASUS in the meantime, has deployed a fix and therefore has urged its users to apply it immediately. Those who are making use of any of the three vulnerable routers mentioned above should make sure that they apply these firmware updates:
RT-AX55: 22.214.171.124.386_51948 or later
RT-AX56U_V2: 126.96.36.199.386_51948 or later
RT-AC86U: 188.8.131.52.386_51915 or later
The Company’s Advice to Users
Also, users of these routers have been advised to turn off the remote administration feature (WAN Web Access), as that is how hackers usually target these devices in question.
ASUS has had quite a busy summer. In late June this very year, the firm was forced to push out a firmware update in a bid to address a host of high-severity flaws that were reportedly discovered. The firmware update in question helped to address no fewer than nine CVEs, and this is including three from 2023, five from the year 2022, and one that dates back as far as 2018. A number of other vulnerabilities as well as issues were also fixed as part of the whole motion.
What ASUS Has To Say About the Development
The company in a statement noted that “If you choose not to install this new firmware version, we strongly recommend disabling services accessible from the WAN side to avoid potential unwanted intrusions,” which is inclusive of remote access from WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger.
The Affected Routers
The routers in question for those that don’t know included: GT6, GT-AXE16000, GT-AX11000 PRO, GT-AXE11000, GT-AX6000, GT-AX11000, GS-AX5400, GS-AX3000, XT9, XT8, XT8 V2, RT-AX86U PRO, RT-AX86U, RT-AX86S, RT-AX82U, RT-AX58U, RT-AX3000, TUF-AX6000, and lastly, TUF-AX5400.
MORE RELATED POSTS