Arbitrary Server Certificate Acceptance in ASUS RT-AC1900P Routers
CVE-2020-15498
5.9MEDIUM
Summary
ASUS RT-AC1900P routers are vulnerable to an issue where they will accept any arbitrary server certificate presented during the firmware update process. This occurs due to the --no-check-certificate option being used when the wget tool fetches firmware update files, opening the door for potential man-in-the-middle attacks. Users are advised to ensure their router's firmware is updated to the latest version to mitigate this risk.
References
CVSS V3.1
Score:
5.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved