ID

VAR-201111-0176


CVE

CVE-2011-4497


TITLE

ASUS RT-N56U Wireless Router 'QIS_wizard.htm' Password Information Disclosure Vulnerability

Trust: 1.5

sources: CNVD: CNVD-2011-3355 // BID: 49308 // CNNVD: CNNVD-201108-457

DESCRIPTION

QIS_wizard.htm on the ASUS RT-N56U router with firmware before 1.0.1.4o allows remote attackers to obtain the administrator password via a flag=detect request. ASUS Provided by RT-N56U Contains an administrative password disclosure vulnerability. ASUS Provided by RT-N56U Is a gigabit compatible wireless router. RT-N56U Contains a management password disclosure vulnerability because authentication is not required to connect to the configuration page that contains the device's management password. Note that you can connect to this device by default. LAN Only for users within.An administrative password may be obtained by a remote third party. An attacker with access to the device can access the http://RouterIPAddress/QIS_wizard.htm?flag=detect page. An attacker can obtain device configuration without entering login credentials. This web page will display the device administrator password. By default, only clients connected to the local domain network (LAN) are allowed to access the system WEB interface. ASUS RT-N56U firmware version 1.0.1.4 is vulnerable. ---------------------------------------------------------------------- The Secunia CSI 5.0 Beta - now available for testing Find out more, take a free test drive, and share your opinion with us: http://secunia.com/blog/242 ---------------------------------------------------------------------- TITLE: ASUS RT-N56U Wireless Router "QIS_wizard.htm" Information Disclosure SECUNIA ADVISORY ID: SA45714 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/45714/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=45714 RELEASE DATE: 2011-08-26 DISCUSS ADVISORY: http://secunia.com/advisories/45714/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/45714/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=45714 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A security issue has been reported in the Asus RT-N56U Wireless Router, which can be exploited by malicious people to disclose sensitive information. The security issue is caused due to the router not restricting access to a page displaying the device's configuration (QIS_wizard.htm?flag=detect) and can be exploited to disclose sensitive information including the device's administrative password. SOLUTION: Update to firmware version 1.0.1.4o PROVIDED AND/OR DISCOVERED BY: Plucky via US-CERT. ORIGINAL ADVISORY: US-CERT: http://www.kb.cert.org/vuls/id/200814 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 3.87

sources: NVD: CVE-2011-4497 // CERT/CC: VU#200814 // JVNDB: JVNDB-2011-002219 // CNVD: CNVD-2011-5782 // CNVD: CNVD-2011-3355 // BID: 49308 // VULHUB: VHN-52442 // PACKETSTORM: 104469

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 1.2

sources: CNVD: CNVD-2011-5782 // CNVD: CNVD-2011-3355

AFFECTED PRODUCTS

vendor:asusmodel:rt-n56uscope:eqversion:1.0.1.4

Trust: 2.1

vendor:asusmodel:rt-n56uscope:eqversion:1.0.0.9

Trust: 1.6

vendor:asusmodel:rt-n56uscope:eqversion:1.0.1.2

Trust: 1.6

vendor:asusmodel:rt-n56uscope:eqversion:1.0.1.3

Trust: 1.6

vendor:asusmodel:rt-n56uscope:lteversion:1.0.1.4

Trust: 1.0

vendor:asusmodel:rt-n56uscope:eqversion:*

Trust: 1.0

vendor:asustek computermodel: - scope: - version: -

Trust: 0.8

vendor:asustek computermodel:rt-n56uscope:eqversion:firmware version 1.0.1.4

Trust: 0.8

vendor:asusmodel:rt-n56uscope: - version: -

Trust: 0.6

vendor:asusmodel:rt-n56u 1.0.1.4oscope:neversion: -

Trust: 0.3

sources: CERT/CC: VU#200814 // CNVD: CNVD-2011-5782 // CNVD: CNVD-2011-3355 // BID: 49308 // JVNDB: JVNDB-2011-002219 // CNNVD: CNNVD-201111-341 // NVD: CVE-2011-4497

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-4497
value: LOW

Trust: 1.0

CARNEGIE MELLON: VU#200814
value: 1.86

Trust: 0.8

NVD: CVE-2011-4497
value: LOW

Trust: 0.8

CNVD: CNVD-2011-5782
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201111-341
value: LOW

Trust: 0.6

VULHUB: VHN-52442
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2011-4497
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:P/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2011-5782
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-52442
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:P/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#200814 // CNVD: CNVD-2011-5782 // VULHUB: VHN-52442 // JVNDB: JVNDB-2011-002219 // CNNVD: CNNVD-201111-341 // NVD: CVE-2011-4497

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-52442 // JVNDB: JVNDB-2011-002219 // NVD: CVE-2011-4497

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201108-457

TYPE

information disclosure

Trust: 1.2

sources: CNNVD: CNNVD-201108-457 // CNNVD: CNNVD-201111-341

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-002219

PATCH

title:RT-N56U - Downloadurl:http://www.asus.com/Networks/Wireless_Routers/RTN56U/#download

Trust: 0.8

title:ASUS RT-N56U QIS_wizard.htm patch for information disclosure vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/37169

Trust: 0.6

title:ASUS RT-N56U Wireless Router 'QIS_wizard.htm' Patch Information Disclosure Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/4895

Trust: 0.6

sources: CNVD: CNVD-2011-5782 // CNVD: CNVD-2011-3355 // JVNDB: JVNDB-2011-002219

EXTERNAL IDS

db:CERT/CCid:VU#200814

Trust: 4.9

db:NVDid:CVE-2011-4497

Trust: 3.4

db:BIDid:49308

Trust: 1.6

db:JVNDBid:JVNDB-2011-002219

Trust: 0.8

db:CNNVDid:CNNVD-201111-341

Trust: 0.7

db:CNVDid:CNVD-2011-5782

Trust: 0.6

db:CNVDid:CNVD-2011-3355

Trust: 0.6

db:CNNVDid:CNNVD-201108-457

Trust: 0.6

db:SECUNIAid:45714

Trust: 0.2

db:VULHUBid:VHN-52442

Trust: 0.1

db:PACKETSTORMid:104469

Trust: 0.1

sources: CERT/CC: VU#200814 // CNVD: CNVD-2011-5782 // CNVD: CNVD-2011-3355 // VULHUB: VHN-52442 // BID: 49308 // JVNDB: JVNDB-2011-002219 // PACKETSTORM: 104469 // CNNVD: CNNVD-201108-457 // CNNVD: CNNVD-201111-341 // NVD: CVE-2011-4497

REFERENCES

url:http://www.kb.cert.org/vuls/id/200814

Trust: 3.5

url:about vulnerability notes

Trust: 0.8

url:contact us about this vulnerability

Trust: 0.8

url:provide a vendor statement

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4497

Trust: 0.8

url:http://jvn.jp/cert/jvnvu200814

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4497

Trust: 0.8

url:http://www.kb.cert.org/vuls/id/200814http

Trust: 0.6

url:http://www.securityfocus.com/bid/49308

Trust: 0.6

url:http://www.asus.com/networks/wireless_routers/rtn56u/

Trust: 0.3

url:http://www.asus.com/

Trust: 0.3

url:http://secunia.com/advisories/45714/#comments

Trust: 0.1

url:http://secunia.com/advisories/45714/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=45714

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/blog/242

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#200814 // CNVD: CNVD-2011-5782 // CNVD: CNVD-2011-3355 // VULHUB: VHN-52442 // BID: 49308 // JVNDB: JVNDB-2011-002219 // PACKETSTORM: 104469 // CNNVD: CNNVD-201108-457 // CNNVD: CNNVD-201111-341 // NVD: CVE-2011-4497

CREDITS

Plucky

Trust: 0.9

sources: BID: 49308 // CNNVD: CNNVD-201108-457

SOURCES

db:CERT/CCid:VU#200814
db:CNVDid:CNVD-2011-5782
db:CNVDid:CNVD-2011-3355
db:VULHUBid:VHN-52442
db:BIDid:49308
db:JVNDBid:JVNDB-2011-002219
db:PACKETSTORMid:104469
db:CNNVDid:CNNVD-201108-457
db:CNNVDid:CNNVD-201111-341
db:NVDid:CVE-2011-4497

LAST UPDATE DATE

2024-08-14T14:21:35.040000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#200814date:2011-08-26T00:00:00
db:CNVDid:CNVD-2011-5782date:2011-11-22T00:00:00
db:CNVDid:CNVD-2011-3355date:2011-08-26T00:00:00
db:VULHUBid:VHN-52442date:2011-11-21T00:00:00
db:BIDid:49308date:2011-11-22T18:25:00
db:JVNDBid:JVNDB-2011-002219date:2013-06-26T00:00:00
db:CNNVDid:CNNVD-201108-457date:2011-08-29T00:00:00
db:CNNVDid:CNNVD-201111-341date:2011-11-22T00:00:00
db:NVDid:CVE-2011-4497date:2011-11-21T11:55:03.557

SOURCES RELEASE DATE

db:CERT/CCid:VU#200814date:2011-08-25T00:00:00
db:CNVDid:CNVD-2011-5782date:2011-11-22T00:00:00
db:CNVDid:CNVD-2011-3355date:2011-08-26T00:00:00
db:VULHUBid:VHN-52442date:2011-11-21T00:00:00
db:BIDid:49308date:2011-08-25T00:00:00
db:JVNDBid:JVNDB-2011-002219date:2011-09-16T00:00:00
db:PACKETSTORMid:104469date:2011-08-26T05:39:04
db:CNNVDid:CNNVD-201108-457date:1900-01-01T00:00:00
db:CNNVDid:CNNVD-201111-341date:2011-11-22T00:00:00
db:NVDid:CVE-2011-4497date:2011-11-21T11:55:03.557