ASUS GT-AXE11000, RT-AX3000, RT-AX55, RT-AX58U, TUF-AX3000 - Improper Authentication

CVE-2021-37910

3.7LOW

Key Information

Vendor
Asus
Status
Gt-axe11000
Rt-ax3000
Rt-ax55
Rt-ax58u
Vendor
CVE Published:
12 November 2021

Badges

πŸ‘Ύ Exploit Exists

Summary

ASUS routers Wi-Fi protected access protocol (WPA2 and WPA3-SAE) has improper control of Interaction frequency vulnerability, an unauthenticated attacker can remotely disconnect other users' connections by sending specially crafted SAE authentication frames.

Affected Version(s)

GT-AXE11000 < 3.0.0.4.386.45898

RT-AX3000 < 3.0.0.4.386.45898

RT-AX55 < 3.0.0.4.386.45898

References

CVSS V3.1

Score:
3.7
Severity:
LOW
Confidentiality:
None
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database0 Proof of Concept(s)
.