Session Token Predictability in Asus Router Firmware
CVE-2017-15654
8.3HIGH
Summary
The vulnerability allows attackers to exploit predictably generated session tokens in the HTTPd server of Asus routers running the AsusWRT firmware. This predictability can lead to unauthorized access to the administrative interface of the router, granting attackers the ability to change settings, intercept network traffic, and potentially compromise the network. All current versions of AsusWRT, including those up to 3.0.0.4.380.7743, are impacted by this issue.
References
CVSS V3.1
Score:
8.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved