华硕产品安全公告
我们一丝不苟地确保华硕产品安全无忧,以便保护重要客户的隐私。 我们致力于依据所有适用的法律规范,提升对安全性及个人信息的保护程度,也欢迎客户随时报告有关产品的安全性或隐私权问题。您提供给华硕的信息只会用来协助解决所报告的安全漏洞或问题,过程中可能会与您联络,索取更多相关信息。
如何向华硕报告安全漏洞或问题
欢迎客户随时报告有关安全性和隐私权的问题及疑虑,若要联络我们,请利用检举专用电子邮件地址 https://www.asus.com/securityadvisory/。为方便我们迅速处理您的疑虑,电子邮件中请附上下列信息。
- 您的全名及联络方式, 联络方式可为电子邮件地址、电话号码或任何其他您偏好的联络方式。若提供电话号码,请附上完整的国家代码、区域号码和分机号码(若有)。
- 针对要报告的问题提供完整、详实的信息。视情况而定,应包括下列信息:
- 有相关疑虑的华硕服务或系统名称。
- 受影响硬件产品的产品类型、产品名称和型号。
- 受影响华硕软件产品的名称、说明和版本编号。
- 针对问题或疑虑提供完整、详实的说明,并附上您认为相关的任何背景信息,以及有助于我们重现和/或解决问题的任何其他相关信息。
负责任的报告行为准则
华硕感谢客户及广大华硕社群的贡献,协助我们改善产品和服务的安全性。然而,调查或报告任何问题时,请您避免轻率行动,并将下列事项铭记在心:
- 未经授权,请勿尝试存取或修改任何华硕服务、系统、产品或软件。
- 请勿揭露、修改、销毁或误用任何您发现的资料。
- 报告问题时,与任一方交流的所有信息务必彻底保密。
接下来的流程?
等到解决报告的问题后,我们会向所有受影响的客户提供适当的解决方案。 我们会将这件事视为第一优先,并在时机成熟时,立即推出解决方案。
华硕也会建立最新软件更新的清单,并附上已修正问题的说明。虽然只要情况允许,我们都会尽量通知客户,但也建议客户定期浏览此页面,掌握第一手更新消息。
安全性更新
Vulnerability: CVE No#: CVE-2022-40259、CVE-2022-40242、CVE-2022-2827
ASUS has released Software Updates for ASMB9-iKVM and ASMB10-iKVM, a remote system management software. This update includes important security updates related to Redfish API, Default credentials for sysadmin user, and ASUS strongly recommends that users update ASMB9-iKVM and ASMB10-iKVM to the latest version. Please go to ASUS server website to download the latest firmware, ASUS will keep update release schedule accordingly.
Should you have any questions or concerns, please contact ASUS via our Security Advisory reporting system:
https://www.asus.com.cn/securityadvisory/
Release version and schedule
ASMB9-iKVM
Model | Motherboard | Updated Version | Release Week |
RS700-E9-RS4 |
Z11PP-D24 |
2.2.9 |
WK5’2023 |
RS700-E9-RS12 |
2.2.9 |
WK5’2023 |
|
RS720-E9-RS12-E |
2.2.4 |
WK5’2023 |
|
RS720-E9-RS24-E |
2.2.4 |
WK5’2023 |
|
RS720-E9-RS8 |
2.2.4 |
WK5’2023 |
|
ESC4000 G4 |
Z11PG-D16 |
2.2.23 |
WK5’2023 |
ESC4000 G4X |
2.2.23 |
WK5’2023 |
|
ESC4000 G4S |
2.2.23 |
WK5’2023 |
|
ESC8000 |
Z11PG-D24 |
2.2.6 |
WK6’2023 |
ESC8000 G4-10G |
2.2.6 |
WK6’2023 |
|
ESC4000A-E10 |
KRPG-U8 |
2.3.5 |
WK6’2023 |
RS700A-E9-RS12V2 |
KNPP-D32-R |
2.2.4 |
WK6’2023 |
RS700A-E9-RS4V2 |
2.2.4 |
WK6’2023 |
|
RS720A-E9-RS24V2 |
2.2.4 |
WK6’2023 |
|
RS720A-E9-RS12V2 |
2.2.4 |
WK6’2023 |
|
KRPA-U16 |
KRPA-U16 |
2.2.3 |
WK6’2023 |
RS500A-E10-PS4 |
2.2.3 |
WK6’2023 |
|
RS500A-E10-RS4 |
2.2.3 |
WK6’2023 |
|
RS500A-E10-RS12U |
2.2.3 |
WK6’2023 |
ASMB10-iKVM
Model | Motherboard | Updated Version | Release Week |
RS700A-E11-RS12U |
KMPP-D32 |
1.2.20 |
WK2’2023 |
RS700A-E11-RS4U |
1.2.20 |
WK2’2023 |
|
RS720A-E11-RS24U |
1.2.20 |
WK2’2023 |
|
RS720A-E11-RS12 |
1.2.20 |
WK2’2023 |
|
RS520A-E11-RS24U |
KMPA-U16 |
1.2.20 |
WK2’2023 |
RS520A-E11-RS12U |
1.2.20 |
WK2’2023 |
|
RS500A-E11-RS12U |
1.2.20 |
WK2’2023 |
|
RS500A-E11-RS4U |
1.2.20 |
WK2’2023 |
|
ESC8000A-E11 |
KMPG-D32 |
1.2.20 |
WK2’2023 |
ESC4000A-E11 |
KMPG-U8 |
1.2.20 |
WK2’2023 |
ESC4000A-E10 |
KRPG-U8 |
2.3.5 |
WK2’2023 |
RS720Q-E10-RS8U |
Z12PH-D16 |
1.2.20 |
WK2’2023 |
RS720-E10-RS12 |
Z12PP-D32 |
1.2.20 |
WK3’2023 |
RS720-E10-RS12E |
1.2.20 |
WK3’2023 |
|
RS720-E10-RS24U |
1.2.20 |
WK3’2023 |
|
RS700-E10-RS4U |
1.2.20 |
WK3’2023 |
|
RS700-E10-RS12U |
1.2.20 |
WK3’2023 |
|
ESC4000-E10 |
Z12PG-D16 |
1.2.20 |
WK3’2023 |
ESC4000-E10S |
1.2.20 |
WK3’2023 |
|
RS300-E11-RS4 |
P12R-M/SYS |
1.1.3 |
WK3’2023 |
P12R-I |
P12R-I |
1.12 |
WK3’2023 |
P12R-E |
P12R-E |
1.13 |
WK3’2023 |
P12R-E/10G-2T |
P12R-E/10G-2T |
1.13 |
WK3’2023 |
Refer to OpenSSL posts https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/
the bugs were introduced as part of punycode decoding functionality (currently only used for processing email address name constraints in X.509 certificates). This code was first introduced in OpenSSL 3.0.0. OpenSSL 1.0.2, 1.1.1 and other earlier versions are not affected.
ASUS routers do not use OpenSSL 3.0.0 and not affected.
Should you have any questions or concerns, please contact ASUS via our Security Advisory reporting system:
https://www.asus.com.cn/securityadvisory/
For further help with router setup and an introduction to network security, please visit
https://www.asus.com.cn/support/FAQ/1008000
https://www.asus.com.cn/support/FAQ/1039292
Vulnerability: CVE No#: CVE-2020-23648
This vulnerability affects the RT-N12E which is in default status.
The RT-N12E is not affected after setting the username and password in the initial setup process.
The other models with 3.0.0.4.xxxx firmware are not affected by this vulnerability.
Should you have any questions or concerns, please contact ASUS via our Security Advisory reporting system:
https://www.asus.com.cn/securityadvisory/
For further help with router setup and an introduction to network security, please visit
https://www.asus.com.cn/support/FAQ/1008000
https://www.asus.com.cn/support/FAQ/1039292
ASUS has released a new version (1.07.84_v2) of Aura Sync app which includes some vulnerability fixes.
For users with Aura Sync 1.07.79 version or any prior versions, ASUS recommends they update to the latest version.
Vulnerability: CVE-2022-36438、CVE-2022-36439
ASUS has released the new ASUS System Control Interface V3 version 3.1.5.0, which includes important security updates for ASUS personal computers, including desktops, laptops and All-in-One PCs. The latest update contains fixes for the CVE-2022-36438、CVE-2022-36439 vulnerability.
ASUS recommends that all ASUS personal computer users running ASUS System Control Interface V3 version 3.1.4.0, or any prior versions, should update to the latest version 3.1.5.0. To learn how to update to the latest version, visit
https://www.asus.com.cn/support/FAQ/1035376/, or update the driver via Windows update:
https://www.asus.com.cn/support/FAQ/1035492
Vulnerability: CVE No#: CVE-2022-38699
ASUS has released a Software Update for Armoury Crate, a system management software. This update includes important security updates, and ASUS strongly recommends that users update their Armoury Crate installation to the latest version. The latest Software Update can be received by opening Armoury Crate, in the “Settings” > “Update Center” tab, and click “Check for Updates”. Click“Update” on ARMOURY CRATE if the new version is available.
ZuoRAT is a MIPS file however RT-AC5300, RT-AC68U, RT-AC68P, RT-AC1900P, RT-AC1900 are ARM–based routers. MIPS program cannot run on ARM–based processor.
ASUS strongly recommends that users update the firmware to the latest version which included more security measures to block malware.
To check the latest version, please visit the relevant ASUS support website. Download links are in the below table.
Model name | Firmware download path |
RT-AC5300 |
https://www.asus.com.cn/supportonly/RT-AC5300/HelpDesk_BIOS/ |
RT-AC68U |
|
RT-AC68P |
|
RT-AC1900P |
https://www.asus.com.cn/supportonly/RT-AC1900P/HelpDesk_BIOS/ |
RT-AC1900 |
https://www.asus.com.cn/supportonly/RT-AC1900/HelpDesk_BIOS/ |
To help owners of these routers take necessary precautions, we compiled a security checklist:
(1) Reset the device to factory default: Login into the web GUI (http://router.asus.com) , go to Administration → Restore/Save/Upload Setting, click the “Initialize all the setting and clear all the data log”, and then click Restore button
(2) Update all devices to the latest firmware.
(3) Ensure default admin password had been changed to a more secure one.
(4) Disable Remote Management (disabled by default, can only be enabled via Advanced Settings).
Vulnerability: CVE-2022-26673, CVE-2022-26674
ASUS has released the firmware for RT-AX88U and fixed CVE-2022-26673 and CVE-2022-26674 vulnerability.
ASUS recommends that users update to the 3.0.0.4.386.46065 or newer version.
If you have already installed the latest firmware version, please disregard this notice.
Should you have any question or concerns, please contact ASUS via our Security Advisory reporting system: https://www.asus.com.cn/securityadvisory/
For further help with router setup and an introduction to network security, please visit
https://www.asus.com.cn/support/FAQ/1008000
https://www.asus.com.cn/support/FAQ/1039292
ASUS has released a new version (2.2.13.0) of ScreenXpert for ASUS laptops that includes important security updates and vulnerability fixes.
For users with an ASUS laptop running ScreenXpert 2.2.12.0 or any prior versions, ASUS recommends they update to the latest version. To check your currently installed version of ScreenXpert and to download the latest version, please visit: https://www.microsoft.com/store/apps/9N5RFFGFHHP6
ASUS has released new firmware that included more security measures to block malware.
ASUS strongly recommends that users update the firmware to the latest version.
To check the latest version, please visit the relevant ASUS support website. Download links are in the below table.
Model name | Firmware download path |
GT-AC5300 |
https://www.asus.com.cn/supportonly/GT-AC5300/HelpDesk_BIOS/ |
GT-AC2900 |
https://rog.asus.com/networking/rog-rapture-gt-ac2900-model/helpdesk_bios |
RT-AC5300 |
https://www.asus.com.cn/supportonly/RT-AC5300/HelpDesk_BIOS/ |
RT-AC88U |
|
RT-AC3100 |
https://www.asus.com.cn/supportonly/RT-AC3100/HelpDesk_BIOS/ |
RT-AC86U |
|
RT-AC68U |
|
RT-AC68R |
|
RT-AC68W |
|
RT-AC68P |
|
RT-AC66U_B1 |
https://www.asus.com.cn/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AC66U-B1/ |
RT-AC3200 |
https://www.asus.com.cn/supportonly/RT-AC3200/HelpDesk_BIOS/ |
RT-AC2900 |
https://www.asus.com.cn/supportonly/RT-AC2900/HelpDesk_BIOS/ |
RT-AC1900P |
https://www.asus.com.cn/supportonly/RT-AC1900P/HelpDesk_BIOS/ |
RT-AC1900 |
https://www.asus.com.cn/supportonly/RT-AC1900/HelpDesk_BIOS/ |
If you have already installed the latest firmware version, please disregard this notice.
Should you have any question or concerns, please contact ASUS via our Security Advisory reporting system: https://www.asus.com.cn/securityadvisory/
For further help with router setup and an introduction to network security, please visit
Vulnerability:
CVE No#: CVE-2022-26668, CVE-2022-26669
ASUS has released a Software update for the ASUS Control Center – An integrated management software. This update includes important security updates, and ASUS strongly recommends that users of ASUS Control Center upgrade the Software to the latest version. Please find the latest Software Update in the following link https://dlcdnet.asus.com/pub/ASUS/server/ACC/ASUS_Control_Center_V1.4.3.2.zip
ASUS is investigating and working for a remediation for Cyclops Blink and will continue to post software update.
To help owners of these routers take necessary precautions, we compiled a security checklist:
(1) Reset the device to factory default: Login into the web GUI(http://router.asus.com) , go to Administration → Restore/Save/Upload Setting, click the “Initialize all the setting and clear all the data log”, and then click Restore button”
(2) Update all devices to the latest firmware.
(3) Ensure default admin password had been changed to a more secure one.
(4) Disable Remote Management (disabled by default, can only be enabled via Advanced Settings).
Affected products
GT-AC5300 firmware = 3.0.0.4.384.xxxx or earlier version
GT-AC2900 firmware = 3.0.0.4.384.xxxx or earlier version
RT-AC5300 firmware = 3.0.0.4.384.xxxx or earlier version
RT-AC88U firmware = 3.0.0.4.384.xxxx or earlier version
RT-AC3100 firmware = 3.0.0.4.384.xxxx or earlier version
RT-AC86U firmware = 3.0.0.4.384.xxxx or earlier version.
RT-AC68U, AC68R, AC68W, AC68P firmware = 3.0.0.4.384.xxxx or earlier version
RT-AC66U_B1 firmware = 3.0.0.4.384.xxxx or earlier version
RT-AC3200. We advise users to reset the router and disable remote connection. New firmware will be released soon.
RT-AC2900 firmware = 3.0.0.4.384.xxxx or earlier version.
RT-AC1900P, RT-AC1900P = 3.0.0.4.384.xxxx or earlier version.
RT-AC87U (EOL)
RT-AC66U (EOL)
RT-AC56U (EOL)
Please note that if you choose not to install this new firmware version then, to avoid any potential unwanted intrusion, we strongly recommend that you disable remote access from WAN and reset your router to its default settings.
If you have already installed the latest firmware version, please disregard this notice.
Should you have any question or concerns, please contact ASUS via our Security Advisory reporting system:
https://www.asus.com.cn/securityadvisory
For further help with router setup and an introduction to network security, please visit
https://www.asus.com.cn/support/FAQ/1008000
https://www.asus.com.cn/support/FAQ/1039292
Vulnerability: CVE-2022-22814
ASUS has released the new MyASUS version 3.1.2.0 for ASUS laptops and desktop PCs, and this version contains important security updates, including fixes for the CVE-2022-22814 vulnerability.
For all ASUS laptops or desktop PCs running MyASUS version 3.1.1.0 or any prior versions, ASUS recommends that users update to the latest version 3.1.2.0. To learn how to update to the latest version, please visit https://www.asus.com.cn/support/FAQ/1039711 , or download the app via the Microsoft store: https://www.microsoft.com/store/apps/9N7R5S6B0ZZH
ASUS would like to thank Denis Faiustov and Ruslan Sayfiev from Ierae Security Inc. for their assistance with this security update.
Vulnerability: CVE-2022-21933
In reaction to this vulnerability, ASUS has released BIOS update for effected Mini-PC product. A full list of download links is provided in the below table.
Executive Summary:
A recently published vulnerability in Apache Log4j (CVE-2021-44228) has the potential to cause remote code execution on servers used by Java-based application for their logging functionality.
For more information, please review the published CVE-2021-44228
Affected Products & Services:
The following table summarizes the ASUS products’ & services’ status as it relates to this vulnerability, and any actions needed to be performed by customers based on information available at this time:
Product Line | Sub-Product | Status | Action Required to Apply Mitigation |
Wireless Routers |
All Models |
Not Affected |
No action required by customers |
Industrial PC |
All Models |
Not Affected |
No action required by customers |
AIOT |
AI Solutions |
Not Affected |
No action required by customers |
All Models |
Not Affected |
No action required by customers |
|
Smart Phones |
All Models |
Not Affected |
No action required by customers |
Commercial NB, PC |
All Models |
Not Affected |
No action required by customers |
Multimedia |
All Models |
Not Affected |
No action required by customers |
Optical Drives |
All Models |
Not Affected |
No action required by customers |
Personal NB, PC |
All Models |
Not Affected |
No action required by customers |
Displays |
All Models |
Not Affected |
No action required by customers |
Gaming devices (ROG) |
All Models |
Not Affected |
No action required by customers |
Mother Boards |
All Models |
Not Affected |
No action required by customers |
Servers |
All Models |
Not Affected |
No action required by customers |
IRobot |
All Models |
Not Affected |
No action required by customers |
Accessories |
All Models |
Not Affected |
No action required by customers |
ASUS Intelligent Cloud Services |
All Web services |
Not Affected |
No action required by customers |
Open Cloud Infra Software |
ASUS Cloud Infra |
Not Affected |
No action required by customers |
Customer support services |
All Web services |
Not Affected |
No action required by customers |
PLEASE FREQUENTLY CHECK FOR INFORMATION ABOUT THE LATEST UPDATES AND ADVISORIES FROM ASUS REGARDING YOUR EQUIPMENT AND SOFTWARE.
THE INFORMATION PROVIDED IN THIS ADVISORY IS PROVIDED ON AN “AS IS” BASIS WITHOUT ANY WARRANTY OR GUARANTEE OF ANY KIND.
ASUS RESERVES THE RIGHT TO CHANGE OR UPDATE THIS ADVISORY AT ANY TIME WITHOUT NOTICE.
Vulnerability:
CVE-2016-2148, CVE-2016-6301, CVE-2018- 1000517, CVE-2020-8169, CVE-2019-5481, CVE-2019-5482, CVE-2018-1000120, CVE-2018- 1000300, CVE-2018-16839 CVE-2018-19052, CVE-2020-14305, CVE-2020-25643, CVE-2019-19052 CVE-2020-27827, CVE-2017-6519, CVE-2021-30004, CVE-2019-16275 CVE-2020-11810, CVE-2020-15078, CVE-2021-30004, CVE-2021-27803, CVE-2019-11555, CVE-2019-9499, CVE-2019-9498, CVE-2019-9497, CVE-2019-9496, CVE-2019-9495, CVE-2019-9494, CVE-2017-13086, CVE-2017-13084, CVE-2017-13082, CVE-2016-4476, CVE-2015-8041, CVE-2021-41435, CVE-2021-41436
ASUS has released firmware updates for the multiple routers. This update includes important security updates, and ASUS strongly recommends that users update the firmware to the latest version.
To check the latest version, please visit the relevant ASUS support website. A full list of download links is provided in the below table.
If firmware is not yet available for your product, please follow these workarounds to protect your network.
- Use unique and strong WiFi passwords.
- Create separate passwords for your WiFi network (SSID) and the admin account for your router's web interface.
- Connect to websites using the HTTPS encryption protocol whenever possible.
For more information, please refer to https://www.asus.com.cn/support/FAQ/1039292
ASUS has released the new BIOS version 303 for the ASUS ZenBook Pro Duo 15 OLED (UX582LR) laptop, which includes important security updates. This latest BIOS update contains fixes for the CVE-2021-42055 vulnerability.
ASUS recommends that all users with the ASUS ZenBook Pro Duo 15 OLED (UX582LR) laptop, running ASUS BIOS version 302 or any prior versions, should update to the latest version 303. To check the installed BIOS version and to download the latest version, visit https://www.asus.com.cn/supportonly/UX582LR/HelpDesk_BIOS/ or update the System Firmware via Microsoft Windows update. https://www.asus.com.cn/support/FAQ/1035492/
ASUS would like to thank SentinelOne® for its assistance with this security update.
Associated CVE: CVE-2020-24588, CVE-2020-26146, CVE-2020-24587
Severity: Medium
ASUS is aware of newly discovered industry-wide WiFi protocol vulnerabilities that affect every brand of WiFi router. The vulnerabilities are known as Fragmentation and Aggregation Attacks (commonly called Frag Attacks). WiFi devices using the WEP, WPA, WPA2 or WPA3 encryption schemes are affected. FragAttacks can be used to silently steal data, and they can also lead to other exploits.
Please note that an attacker needs to be connected to your WiFi network in order to exploit these vulnerabilities, so they need to be within WiFi signal range and know your WiFi password.
ASUS is working round the clock to release firmware fixes for these vulnerabilities.
Please check the list of router models below for links to updated firmware.
If firmware is not yet available for your product, please follow these workarounds to protect your network.
1. Install these three security updates for Windows 10, 8.1 and 7.
CVE-2020-24587 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-24587
CVE-2020-24588 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-24588
CVE-2020-26144 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-26144
2. Follow these security tips to secure your network.
- Use unique and strong WiFi passwords.
- Create separate passwords for your WiFi network (SSID) and the admin account for your router's web interface.
- Connect to websites using the HTTPS encryption protocol whenever possible.
For more information, please refer to https://www.asus.com.cn/support/FAQ/1039292
漏洞:
CVE-2021-28175, CVE-2021-28176, CVE-2021-28177, CVE-2021-28178, CVE-2021-28179, CVE-2021-28180, CVE-2021-28181, CVE-2021-28182, CVE-2021-28183, CVE-2021-28184, CVE-2021-28185, CVE-2021-28186, CVE-2021-28187, CVE-2021-28188, CVE-2021-28189, CVE-2021-28203, CVE-2021-28204CVE-2021-28205, CVE-2021-28190, CVE-2021-28191, CVE-2021-28192, CVE-2021-28193, CVE-2021-28194, CVE-2021-28195, CVE-2021-28196, CVE-2021-28197, CVE-2021-28198, CVE-2021-28199, CVE-2021-28200, CVE-2021-28201, CVE-2021-28202, CVE-2021-28206, CVE-2021-28207, CVE-2021-28208, CVE-2021-28209
ASUS has released a firmware update for the ASUS ASMB8-iKVM and ASMB9-iKVM server-management modules. This update includes important security updates, and ASUS strongly recommends that users of ASMB8-iKVM and ASMB9-iKVM upgrade the BMC firmware to the latest version.
To check the installed version of ASMB8-iKVM and ASMB9-iKVM and to download the latest version, please visit the relevant ASUS support website. A full list of download links is provided in the below table.
漏洞: CVE-2021-26943
ASUS has released a new BIOS version 304 for ASUS ZenBook Flip UX360CA that includes important security updates. This latest BIOS update contains fixes for the CVE-2021-26943 vulnerability.
ASUS recommends that all users with the ZenBook Flip UX360CA laptop, running ASUS BIOS version 303 or any prior versions, should update to the latest version 304. To check the installed BIOS version and to download the latest version, visit https://www.asus.com.cn/support/FAQ/1045541/
安全公告适用于 DNSpooq
CVE: CVE-2020-25681, CVE-2020-25782, CVE-2020-25683, CVE-2020-25684, CVE-2020-25685, CVE-2020-25686, CVE-2020-25687
Severity: Medium
Abstract
This quick-patch beta firmware was released on February 2, 2021. The first model-specific regular firmware update has just been released, and other models are scheduled to follow in the near future. The beta firmware requires users to perform a manual update.
Products from over 40 companies, including ASUS routers, are affected by DNSpooq.
There are two sets of vulnerabilities.
- Buffer-overflow vulnerabilities: CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687
- DNS cache-poisoning vulnerabilities: CVE-2020-25684, CVE-2020-25685, CVE-2020-25686
No ASUS routers are affected by CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687, because these vulnerabilities only affect DNSSEC.
ASUS routers are only affected by DNS cache-poisoning vulnerabilities, with medium severity. All these vulnerabilities can be fixed by updating to the new firmware.
DNS cache poisoning can potentially allow a remote-code execution that would impact the security of many brands of home router and other networking equipment.
受影响的型号
https://www.asus.com.cn/support/FAQ/1008000
https://www.asus.com.cn/support/FAQ/1039292
漏洞: CVE-2020-15009
AsusScreenXpertServicec.exe and ScreenXpertUpgradeServiceManager.exe in ScreenPad2_Upgrade_Tool.msi V1.0.3 for ASUS PCs with ScreenPad 1.0 (UX450FDX, UX550GDX and UX550GEX) could lead to unsigned code execution with no additional restrictions when a user puts an application at a particular path with a particular file name.
ASUS has released a new version (1.0.4) of the ScreenPad2 Upgrade Tool that includes important security updates. ASUS recommends that users with ASUS PCs with ScreenPad 1.0 (UX450FDX, UX550GDX and UX550GEX) running the ScreenPad2 Upgrade Tool version 1.0.3 or earlier update to the latest version.
To check the installed version of the ScreenPad 2 Upgrade Tool and to download the latest version, visit https://www.asus.com.cn/support/FAQ/1043674
ASUS would like to thank Michael van Griensven for assistance with this security update.
ASUS is aware of recent security research disclosing potential security vulnerabilities in Intel® CSME, Intel® SPS, Intel® TXE, Intel® AMT, Intel® PTT and/or Intel® DAL chipsets. These vulnerabilities may result in:
- Improper privilege changes;
- Denial of service;
- Disclosure of information.
ASUS is working closely with platform owners to provide firmware and software updates for all affected devices, to mitigate potential risks associated with the vulnerabilities that have been identified.
Symptom 描述与华硕解决方案
请查阅附件
Intel-CSME-security-Symptom-Description-and-Solution.pdf
重要提示: ASUS BIOS Update FAQ
- How do I determine the model name and number of my device?
https://www.asus.com.cn/support/FAQ/1030673 - How do I use Winflash to update the BIOS version in my Windows system?
https://www.asus.com.cn/support/FAQ/1008276
In order to successfully install the latest BIOS update, please keep your computer plugged in and do not turn off your computer during the BIOS update process. - Further questions? Contact us at https://www.asus.com.cn/support/
PLEASE FREQUENTLY CHECK FOR INFORMATION ABOUT THE LATEST UPDATES AND ADVISORIES FROM ASUS REGARDING YOUR EQUIPMENT AND SOFTWARE. THE INFORMATION PROVIDED IN THIS ADVISORY IS PROVIDED ON AN “AS IS” BASIS WITHOUT ANY WARRANTY OR GUARANTEE OF ANY KIND. ASUS RESERVES THE RIGHT TO CHANGE OR UPDATE THIS ADVISORY AT ANY TIME WITHOUT NOTICE.
漏洞: CVE-2020-10649
ASUS has released a new version (1.0.7.0) of ASUS Device Activation for Win 10 notebook PCs that includes important security updates. This latest application update contains fixes for the CVE-2020-10649 vulnerability.
ASUS recommends that users with Win 10 notebook PCs running ASUS Device Activation version 1.0.6.0 and all prior versions to update to the latest version. To check the installed version of ASUS Device Activation and to download the latest version, visit https://www.asus.com.cn/support/FAQ/1042640 .
ASUS would like to thank Anas Khan for the assistance with this security update.
A new firmware update is now available for selected ASUS routers. This latest firmware update contains fixes for the CVE-2019-15126 (Kr00k) vulnerability, which allows unauthorized decryption of some WPA2-encrypted traffic in devices using some Broadcom and Cypress WiFi chips. This includes some ASUS routers.
We strongly encourage you to periodically audit both your networking equipment and your network security procedures.
We strongly recommend that you update your router to the latest firmware as soon as the new firmware is released. You will find the latest firmware available for download from the ASUS support page https://www.asus.com.cn/support/, or on each model’s official product page. You will find links to the new firmware for selected ASUS routers at the end of this notice. Please note that updated firmware for some models is still undergoing testing, and will be made available as soon as possible.
If you have already installed the latest firmware version, please disregard this notice.
Should you have any questions or concerns, please contact ASUS via our Security Advisory reporting system: https://www.asus.com.cn/securityadvisory/
For further help with router setup and an introduction to network security, please visit
https://www.asus.com.cn/support/FAQ/1008000
https://www.asus.com.cn/support/FAQ/1039292
Since 2018, ASUS has offered a firmware patch for affected routers to address the CVE-2018-18287 vulnerability, among other important security updates. All later firmware is unaffected.
ASUS recommends all users to always update their routers with the latest firmware. If a router’s firmware is not updated then ASUS strongly recommends to disable remote access from WAN or AiCloud, as well as resetting the router to its default settings. These steps will maximize security.
Users who have already installed the latest firmware version may disregard this notice.
For any questions or concerns, please contact ASUS via our Security Advisory reporting system: https://www.asus.com.cn/securityadvisory/
For further help with router setup and an introduction to network security, please visit:
https://www.asus.com.cn/support/FAQ/1008000
https://www.asus.com.cn/support/FAQ/1039292
ASUS update the ROG Gaming Center Package that includes important security updates.
ASUS would like to thank Eli Paz from CyberArk Labs for the assistance with this security update.
ASUS is releasing a firmware update for selected routers. Our most recent firmware update contains enhanced security protections against unauthorized access, alteration, disclosure of data, malware, phishing and DDoS attacks.
We strongly encourage you to periodically audit both your equipment and your security procedures, as this will ensure that you will be better protected against unwanted intrusion. As a user of an ASUS router, we advise taking the following actions:
- Update your router to the latest firmware. We strongly recommend that you do so as soon as new firmware is released. You will find the latest firmware available for download from the ASUS support page at https://www.asus.com.cn/support/ or the appropriate product page at https://www.asus.com.cn/Networking/. ASUS has provided a link to new firmware for selected routers at the end of this notice.
- Set up separate passwords for your wireless network and router-administration page. Use passwords with a length of at least eight characters, including a mix of capital letters, numbers and symbols. Do not use the same password for multiple devices or services.
- Enable ASUS AiProtection, if your router supports this feature. Instructions on how to do this can be found in your router’s manual, or on the relevant ASUS support page, at https://www.asus.com.cn/Networking/.
Please note that if you choose not to install this new firmware version then, to avoid any potential unwanted intrusion, we strongly recommend that you disable remote access from WAN or AiCloud, and reset your router to its default settings.
If you have already installed the latest firmware version, please disregard this notice.
Should you have any question or concerns, please contact ASUS via our Security Advisory reporting system: https://www.asus.com.cn/securityadvisory/
For further help with router setup and an introduction to network security, please visit
https://www.asus.com.cn/support/FAQ/1008000
https://www.asus.com.cn/support/FAQ/1039292
- ASUSWRT is the name of the router’s firmware and web interface. It does not refer to any iOS, iPadOS or Android app.
- ASUS engineers performed internal tests on ASUSWRT using simulated data and there wasn’t any real user data involved in the process. The test is now over and the server has been taken offline since.
- Any reports alleging the application of real user data during the ASUSWRT test are inaccurate and misleading.
If there are any questions or concerns, please contact ASUS via our Security Advisory reporting system: https://www.asus.com.cn/securityadvisory/
For further help with router setup and an introduction to network security, please visit https://www.asus.com.cn/support/FAQ/1039292
AsLdrSrv.exe in ASUS ATK Package before V1.0.0061 (for Windows 10 notebook PCs) could lead to unsigned code execution with no additional execution. The user must put an application at a particular path, with a particular file name.
ASUS has released a new version (1.0.0061) of ATK Package for Win 10 notebook PCs that includes important security updates. ASUS recommends that users with Win 10 notebook PCs running ATK Package version 1.0.0060 and all prior versions update to the latest version.
To check the installed version of ATK Package and to download the latest version, visit https://www.asus.com.cn/support/faq/1041545.
ASUS would like to thank Peleg Hadar from SafeBreach Labs for the assistance with this security update.
ASUS has released a BIOS update for notebook PCs to ensure a more secure and convenient computing experience. This update only affects users who currently have a password for their BIOS or hard drive. Concerned users with a password should install the new BIOS update via Windows Update or refer to the instruction from https://www.asus.com.cn/support/FAQ/1040162.
*ASUS would like to thank Frédéric Vachon from ESET for helping find out this issue.
ASUS is releasing a firmware update for selected routers. Our most recent firmware update contains enhanced security protections against unauthorized access, alteration, disclosure of data, malware, phishing and DDoS attacks.
We strongly encourage you to periodically audit both your equipment and your security procedures, as this will ensure that you will be better protected against unwanted intrusion. As a user of an ASUS router, we advise taking the following actions:
- Update your router to the latest firmware. We strongly recommend that you do so as soon as new firmware is released. You will find the latest firmware available for download from the ASUS support page at https://www.asus.com.cn/support/ or the appropriate product page at https://www.asus.com.cn/Networking/. ASUS has provided a link to new firmware for selected routers at the end of this notice.
- Set up separate passwords for your wireless network and router-administration page. Use passwords with a length of at least eight characters, including a mix of capital letters, numbers and symbols. Do not use the same password for multiple devices or services.
- Enable ASUS AiProtection, if your router supports this feature. Instructions on how to do this can be found in your router’s manual, or on the relevant ASUS support page, at https://www.asus.com.cn/Networking/.
Please note that if you choose not to install this new firmware version then, to avoid any potential unwanted intrusion, we strongly recommend that you disable remote access from WAN or AiCloud, and reset your router to its default settings.
If you have already installed the latest firmware version, please disregard this notice.
Should you have any question or concerns, please contact ASUS via our Security Advisory reporting system: https://www.asus.com.cn/securityadvisory/
For further help with router setup and an introduction to network security, please visit
https://www.asus.com.cn/support/FAQ/1008000
https://www.asus.com.cn/support/FAQ/1039292
ASUS is aware of the vulnerability listed below. We take your security seriously and are working diligently to provide a software update for the affected ZenFone models. Please update your ZenFone to the latest software version as soon as it becomes available. In the meantime, we highly recommended using ASUS Mobile Manager or installing another reliable third-party security app to further secure your devices.
可能的漏洞:
ASUS Contact
- Private contacts’ user profiles (name, call log, settings) are liable to be accessed, added or deleted.
- Information of blacklist (blocked phone numbers) is liable to be accessed, added or deleted.
ASUS Message
- Private message may be leaked.
- Any apps can send voice messages without user’s permission.
ASUS Launcher
- No permissions required to unlock app
The following are some security precautions recommended for all users:
(1) Ensure your operating system and software up to date with the latest version, which you can find on the ASUS website (www.asus.com). Using the search tool located on the top right hand of the ASUS website, search for your device model, and then follow this path: Support > Driver & Utility > Driver & Tools > BIOS & Firmware. Here you can double check if the latest version is the same on your device or you can choose to download it in the event your device did not automatically update.
(2) Do not download any apps outside of Google Play.
(3) Uninstall all apps previously downloaded from non-Google Play sources.
(4) Install ASUS Mobile Manager or a reliable third-party security app to strengthen the security of your devices and applications.
漏洞: OpenVPN users are able to log in to the web UI with their password
Solution:
请立即更新华硕路由器固件
If a firmware update cannot be made the mitigations listed below should be applied, however it’s strongly advised the user updates the firmware at the earliest opportunity:
• Disable VPN (available on limited models)
• Change login ID & password again. The password should be at least 8 characters using a mix of letters, numbers and special symbols.
Affected Products
Model Firmware(Minimum Recommended Version)
BRT-AC828 3.0.0.4.380.7526
GT-AC5300 3.0.0.4.384.21045
RT-AC5300 3.0.0.4.384.20942
RT-AC88U 3.0.0.4.384.20942
RT-AC3200 3.0.0.4.382.50470
RT-AC3100 3.0.0.4.384.20942
RT-AC88U 3.0.0.4.382.50702
RT-AC88R 3.0.0.4.382.50702
RT-AC86U 3.0.0.4.384.21045
RT-AC2900 3.0.0.4.384.21045
RT-AC68U 3.0.0.4.384.20942
RT-AC68R 3.0.0.4.384.20942
RT-AC68P 3.0.0.4.384.20942
RT-AC68W 3.0.0.4.384.20942
RT-AC68UF 3.0.0.4.384.20942
RT-AC1900U 3.0.0.4.384.20942
RT-AC1900 3.0.0.4.384.20942
RT-AC56U 3.0.0.4.382.50624
RT-AC56S 3.0.0.4.382.50624
RT-AC66U_B1 3.0.0.4.384.20942
RT-AC1750_B1 3.0.0.4.384.20942
RT-AC66U 3.0.0.4.382.50470
RT-AC66R 3.0.0.4.382.50470
RT-AC66W 3.0.0.4.382.50470
RT-AC55UHP 3.0.0.4.382.50470
RT-AC55U 3.0.0.4.382.50470
RT-AC1200G 3.0.0.4.382.50624
RT-AC1200G+ 3.0.0.4.382.50624
RT-N800HP 3.0.0.4.382.50470
RT-N66U_C1 3.0.0.4.384.20942
RT-N66U 3.0.0.4.382.50470
RT-N18U 3.0.0.4.382.50470
Lyra 3.0.0.4.382.11600
Lyra mini 3.0.0.4.382.11600
Lyra Trio 3.0.0.4.382.20208
BlueCave 3.0.1.4.383.19267
ASUS is aware of the vulnerability listed below. We take your security seriously and are working diligently to provide a software update for the affected ZenFone/ZenPad models. Please update your ZenFone/ZenPad to the latest software version as soon as it becomes available. In the meantime, we highly recommended using ASUS Mobile Manager or installing another reliable third-party security app to further secure your devices.
可能的漏洞:
• A malicious app can get a bug report.
• A malicious app can take a screenshot (with a screenshot animation).
• Arbitrary apps can be installed remotely over the internet and can also be uninstalled after being run.
• Commands can be executed as the system user.
The following are some security precautions recommended for all users:
(1) Ensure your operating system and software up to date with the latest version, which you can find on the ASUS website (www.asus.com). Using the search tool located on the top right hand of the ASUS website, search for your device model, and then follow this path: Support > Driver & Utility > Driver & Tools > BIOS & Firmware. Here you can double check if the latest version is the same on your device or you can choose to download it in the event your device did not automatically update.
(2) Do not download any apps outside of Google Play.
(3) Uninstall all apps previously downloaded from non-Google Play sources.
(4) Install ASUS Mobile Manager or a reliable third-party security app to strengthen the security of your devices and applications.
Talos Intelligence recently discovered that VPNFilter is targeting more makes and models than initial release, and the following ASUS routers may be potential targets:
RT-AC66U
RT-N10 (EOL)
RT-N10E (EOL)
RT-N10U (EOL)
RT-N56U (EOL)
RT-N66U
To help owners of these routers take necessary precautions, we compiled a security checklist:
(1) Reset the device to factory default: Hold the Reset button in the rear for at least five seconds until the power LED starts blinking.
(2) Update all devices to the latest firmware.
(3) Ensure default admin password had been changed to a more secure one.
(4) Disable Remote Management (disabled by default, can only be enabled via Advanced Settings).
(5) Enable the URL filter in the Advanced Settings -> Firewall. Set the Filter table type as Black List. Add the "photobucket" and "toknowall" in the URL filter list.
For any users with the EOL models listed above, we strongly advise upgrading to a router with AiProtection. A wide selection of ASUS and ROG routers offer AiProtection powered by Trend Micro™. Anytime a threat is detected, the connection between your device and the malicious server is blocked before any personal data is compromised. The list of malicious servers is constantly updated by syncing with the Trend Micro cloud database automatically, to ensure your network environment is secure around the clock.
漏洞: CVE-2018-5999, CVE-2018-6000
ASUS and ROG router products affected are shown in a list below.
This vulnerability bypasses any user/password changes made by the owner.
Possible changes to router settings:
- Port number changes
- VPN account & password changes
- DDNS changes
- The UI language has changed
Solution:
Please immediately update your ASUS and ROG router to the latest firmware available.
If a firmware update cannot be made the mitigations listed below should be applied, however it’s strongly advised the user updates the firmware at the earliest opportunity:
- Disable SSH / Telnet
- Disable VPN (available on limited models)
- Enable AiProtection (available on limited models)
- Change login ID & password again. The password should be at least 8 characters using a mix of letters, numbers and special symbols.
Affected Products:
Model | Firmware (Minimum Recommended Version) |
BRT-AC828 | 3.0.0.4.380.7432 |
GT-AC5300 | 3.0.0.4.384.20287 |
RT-AC5300 | 3.0.0.4.384.20287 |
RT-AC88U | 3.0.0.4.384.10007 |
RT-AC3100 | 3.0.0.4.384.10007 |
RT-AC86U | 3.0.0.4.384.10007 |
RT-AC2900 | 3.0.0.4.384.10007 |
RT-AC68 series | 3.0.0.4.384.10007 |
RT-AC1900 series | 3.0.0.4.384.10007 |
RT-AC66U_B1 | 3.0.0.4.384.10007 |
RT-AC1750_B1 | 3.0.0.4.384.10007 |
RT-AC87 series | 3.0.0.4.382.50010 |
RT-AC3200 | 3.0.0.4.382.50010 |
RT-AC56U | 3.0.0.4.382.50010 |
RT-AC55U | 3.0.0.4.382.50018 |
RT-AC1200 | 3.0.0.4.380.10446 |
RT-N18U | 3.0.0.4.382.39935 |
RT-AC51U+ | 3.0.0.4.380.10446 |
RT-AC52U_B1 | 3.0.0.4.380.10446 |
Lyra | 3.0.0.4.382.11572 |
Lyra mini | 3.0.0.4.382.11572 |
RT-AC66U | 3.0.0.4.380.8228 |
RT-N66U | 3.0.0.4.380.8228 |
RT-N600 | 3.0.0.4.380.10446 |
RT-AC1200GU | 3.0.0.4.380.10446 |
RT-AC1200G | 3.0.0.4.382.50276 |
RT-AC1200G+ | 3.0.0.4.382.50276 |
RT-AC53 | 3.0.0.4382.10446 |
RT-AC750GF | 3.0.0.4382.10446 |
RT-AC53U | 3.0.0.4.380.8228 |
RT-N12_D1 | 3.0.0.4.380.8228 |
RT-N12HP_B1 | 3.0.0.4.380.8228 |
RT-AC56S | 3.0.0.4.382.50624 |
RT-N14U | 3.0.0.4.380.8285 |
RT-N14UHP | 3.0.0.4.380.8287 |
RT-AC54U | 3.0.0.4.380.8228 |
RT-ACRH17 | 3.0.0.4.382.50243 |
RT-AC55UHP | 3.0.0.4.382.50276 |
RT-N300 | 3.0.0.4.380.8228 |
RT-AC1200HP | 3.0.0.4.380.8228 |
RT-AC51U | 3.0.0.4.380.8228 |
RT-AC750 | 3.0.0.4.380.8228 |
RT-AC52U | 3.0.0.4.380.8241 |
RT-AC58U | 3.0.0.4.380.8228 |
RT-ACRH13 | 3.0.0.4.380.8228 |
RT-AC1300UHP | 3.0.0.4.380.8228 |
RT-N11P_B1 | 3.0.0.4.380.10410 |
RT-N300_B1 | 3.0.0.4.380.10410 |
RT-N12 VP_B1 | 3.0.0.4.380.10410 |
RT-N12+ B1 | 3.0.0.4.380.10410 |
RT-N12+ PRO | 3.0.0.4.380.10410 |
RT-N12E C1 | 3.0.0.4.380.10410 |
ASUS is working closely with chipset suppliers to resolve the vulnerability in the WPA2 security protocol, which affects some but not all ASUS products (check the list below). KRACK can exploit the vulnerability only under certain conditions highlighted in the previous update.
Your network configuration is more secure when under these conditions:
(1) Routers and gateways working in their default mode (Router Mode) and AP Mode.
(2) Range extenders working in AP Mode.
(3) When Powerline adapters and switch products are used.
ASUS is working actively towards a solution, and will continue to post software updates. Find out more: https://www.asus.com.cn/support/
Full list of routers unaffected by KRACK while in default mode:
GT-AC5300
RT-AC1200
RT-AC1200G
RT-AC1200G Plus
RT-AC1200HP
RT-AC1300HP
RT-AC1900
RT-AC1900P
RT-AC3100
RT-AC3200
RT-AC51U
RT-AC52U
RT-AC53
RT-AC5300
RT-AC53U
RT-AC54U
RT-AC55U
RT-AC55UHP
RT-AC56S
RT-AC56U
RT-AC58U
RT-AC66U
RT-AC66U B1
RT-AC66W
RT-AC68P
RT-AC68UF
RT-AC68W
RT-AC86U
RT-AC87U
RT-AC88U
RT-ACRH17
RT-ACRH13
RT-N10P V3
RT-N11P B1
RT-N12 D1
RT-N12 VP B1
RT-N12+
RT-N12+ B1
RT-N12E C1
RT-N12E_B1
RT-N12HP B1
RT-N14U
RT-N14UHP
RT-N16
RT-N18U
RT-N300 B1
RT-N56U
RT-N56U B1
RT-N65U
RT-N66U
RT-N66W
BRT-AC828
DSL-AC87VG
DSL-AC52U
DSL-AC55U
DSL-AC56U
DSL-AC68R
DSL-AC68U
DSL-N10_C1
DSL-N12E_C1
DSL-N12HP
DSL-N12U
DSL-N12U B1
DSL-N12U D1
DSL-N12U_C1
DSL-N14U
DSL-N14U B1
DSL-N16
DSL-N16U
DSL-N17U
DSL-N55U D1
DSL-N55U_C1
4G-AC68U
RT-AC65U
RT-AC85U
ASUS is aware of the recent WPA2 vulnerability issue. We take your security and privacy seriously and are currently working towards a full solution as quickly as possible. In the meantime, we want to help clarify the severity of the potential threat, and let our valued customers know the appropriate steps to take in order to avoid or lessen the threat of being compromised.
Your devices are only vulnerable if an attacker is in physical proximity to your wireless network and is able to gain access to it. This exploit cannot steal your banking information, passwords, or other data on a secured connection that utilizes proper end-to-end encryption. However, an attacker could capture and read this information on an unsecured connection via an exploited WiFi network. Depending on the network configuration, it is also possible for the attacker to redirect network traffic, send invalid data to devices or even inject malware into the network.
We are feverishly working with chipset suppliers to resolve this vulnerability and will release patched firmware for affected routers in the near future. Before this patched firmware is released, here are a few cautions all users should take:
(1) Avoid public Wi-Fi and Hotspots until the routers and your devices are updated. Use cellular network connections if possible.
(2) Only connect to secured services that you trust or have been verified. Web pages that use HTTPS or another secure connection will include HTTPS in the URL. If the connection is secured using TLS 1.2 your activities with that service is safe for now.
(3) Keep your operating system and antivirus software up-to-date. Microsoft recently updated Windows to fix this exploit on their latest operating systems. Google and Apple are following suit shortly.
(4) When in doubt, be safe and use your cellular network or a wired connection (Ethernet) to access the internet. This exploit only affects 802.11 traffic between a Wi-Fi router and a connected device on an exploited WiFi connection.
04/24/2017 新固件适用于无线路由器 RT-AC5300/ 无线路由器 RT-AC3100
04/14/2017 新固件适用于无线路由器 RT-AC53
03/31/2017 新固件适用于无线路由器 RT-AC87U/ RT-AC87R/ RT-AC3200/ RT-AC68U/ RT-AC68R/ RT-AC68W/ RT-AC68P/ RT-AC1900P/ RT-AC66U/ RT-AC66R/ RT-AC1750/ RT-AC56U/ RT-AC56R/ RT-N66U/ RT-N66R/ RT-N66W/ RT-AC53U/ RT-AC51U/ RT-AC750/ RT-N300/ RT-N11P/ RT-N12+/ RT-N12+ Pro/ RT-N12E B1/
03/24/2017 新软件适用于无线网卡 PCE-AC56
12/23/2016 新固件适用于无线路由器 RT-AC5300 / RT-AC88U / RT-AC3100 / RT-AC3200 / RT-AC87U / RT-AC87R / RT-AC66U / RT-AC66W / RT-AC1750 / RT-AC55UHP / RT-AC55U / RT-AC52U / RT-N56U / RT-N12 D1
12/13/2016 新固件适用于无线路由器 RT-AC68U / RT-AC68R / RT-AC68W / RT-AC68UF / RT-AC68P / RT-AC1900P / RT-AC1900 / RT-AC66U_B1
10/29/2016 新固件适用于Repeater RP-N12 / RP-N14 / RP-N53 / RP-AC52/ RP-AC56/ Media Bridge EA-N66/ EA-N66R
10/17/2016 新 ATK 驱动程序可用于笔记本电脑 K53SV
09/10/2016 新固件适用于 RT-AC66U /
RT-AC66R /
RT-AC66W /
RT-AC1750
名人堂
我们由衷感谢下列人员负责任地向我们进行了披露。他们是首批通知证实的漏洞且同意经由华硕电脑公司进行修复的报告人,感谢你们并祝贺你们展示了自己的专业技能、安全知识及负责任的行为。
- Suprit P. (s3ctat0r)
- Ori Levi
- Martin Kibuchi
- Nuttakorn Tungpoonsup & Sittikorn Sangrattanapitak & Ammarit Thongthua @Secure D Global : Vulnerability Research Team
- Abdul Rauf
- Mohamad Takrory
- Yagnik Bhuva
- David Ward
- HeeChan Kim of TeamH4C
- Abdul Rauf
- Vishal Patidar
- Steven Sroba
- Rahul Thanth
- Anas khan
- Abdul Rauf
- Aman Singh
- Chetanya Sharma
- 顾洪利 (Holy Gu)
- Ramkrishna Sawant
- Miguel Santareno
- Trend Micro Research
- Akash Verma
- Howard McGreehan
- Kari Hulkko and Tuomo Untinen from The Synopsys Cybersecurity Research Center (CyRC)
- Sk md Sahil
- Samprit Das (sampritdas8)
- Milan Kyselica of IstroSec
- Denis Faiustov, Ruslan Sayfiev of Ierae Security
- Balamurugan A
- Hector flores
- @Gaurav Dalal (webcipher101)
- CyberNow Labs Red Team
- Kartik Singh
- Abilash.V.L
- Aswin Reji
- Hardik Rathod
- Jacques Mister
- Jaydev Ahire
- Naveen Kumawat(@nvk0x)
- Rohan Panchal
- Sayeed Shaik
- HP of Cyber Kunlun Lab
- Luke Walker – SmartDCC
- Fans0n、le3d1ng、Mwen、daliy yang from 360 Future Security Labs
- @d0gkiller87
- Ganga Manivannan
- Huli (From Cymetrics/OneDegree)
- Kandarpdave Dave
- Rakan Abdulrahman Al Khaled
- Sabarinath Panikan
- Efstratios Chatzoglou, University of the Aegean, Georgios Kambourakis, European Commission at the European Joint Research Centre, and Constantinos Kolias, University of Idaho
- CataLpa from DBappSecurity Co.,Ltd Hatlab.
- Yao Chen(@ysmilec) of 360 Alpha Lab
- Arjun-E
- Mahmoud Reda
- Jiawei Yin(@yngweijw)
- Federico Lagrasta
- Nasser Altowairqi (@r00t_nasser)
- Shuvam Adhikari of SSCSS Nepal
- Jixing Wang (@chamd5)
- Abhishek Vishwakarma
- Quentin Kaiser from IoT Inspector Research Lab
- Aytac Kalinci
- Subash Giri
- Efstratios Chatzoglou, University of the Aegean
- Georgios Kambourakis, European Commission at the European Joint Research Centre
- Constantinos Kolias, University of Idaho
- Jebarson Immanuel
- Krishna Chaitanya A
- Ricardo J Marques Montilla
- Ashik Kunjumon
- Deepak Kumar Singh
- ZeddYu Lu
- Ye Li (From Tencent Security Xuanwu Lab.)
- Zhuo Ma (From Tencent Security Xuanwu Lab.)
- Chris Bellows, Darren Kemp – Atredis Partners
- Milan Kyselica and Roman Stevanak LIFARS
- 李想 清华大学NISL实验室
- Abdulaziz Almisfer
- Bader Almutairi
- Chirag Soni
- Harinder Singh
- Denis Straghkov, Grigoriy Ivanov, Palchikov Pavel
- Daniel Moura (@opps3c)
- Pankaj Thakur
- Wai Yan Aung
- Denis Straghkov, Grigoriy Ivanov, Palchikov Pavel
- Jehad Al-qurashi (TW : Je_1r)
- Omar Al-talhi (IG : eltd)
- Ali Al-shehri(IG : zi9r)
- Khalid Al-harthi (IG : luis90o)
- Muhammed Sadettin KARATAŞ
- Tolgahan Demirayak
- 施伟铭 @ 长亭科技
- Md. Nur A Alam Dipu
- Fatih Çelik
- Бодиштяну Богдан
- Dasari Chandra Mouli (@chanducs_)
- Gal Nagli (@naglinagli)
- Md. Nur A Alam Dipu
- swings & leommxj &chennan, from Chaitin Security Research Lab.
- Siwong kim (@SNTWORKS)
- Santosh Kumar
- Matt Moran
- Marc Ruef
- Jai Kumar B
- Gal Nagli (@naglinagli)
- Vedant Tekale (@_justynot)
- Prince Prafull
- Gal Nagli
- Ahmad A Abdulla
- Robert Chen
- tejas.pingulkar
- Mritunjay Kumar
- Matt Moran
- Rhitik Wadhvana
- Robert Foggia
- Ahmet Said Göksu
- Amr Al Hallak
- Mehmet Can GÜNEŞ
- Niels Teusink
- Michael van Griensven
- Agrah Jain
- Mehedi Hasan Remon (@mehedi1194)
- Naveen Kumawat (nvk)
- Salonee Jaiswal
- Shankar R
- Wai Yan Aung
- Jinwei Chen (Bangcle Security)
- SecurityMate (@securitymate)
- Steffin Stanly
- Wai Yan Aung
- Hein HtetAung
- Lütfü Mert Ceylan
- Wai Yan Aung
- Yusuf Kocadaş
- Ishan Anand
- João Varelas
- مصطفى محمود
- Romon Wafa
- Wai Yan Aung
- Joby Y Daniel
- Pritam Mukherjee
- Raphael Karger
- Wai Yan Aung
- Sonam Kumar
- pr0v3rbs of KAIST SysSec
- Martin Rakhmanov
- Mustafa Diaa (@c0braBaghdad1)
- Hasnain Shaukat
- Wai Yan Aung
- Matt Langlois
- Pankaj Kumar Thakur (NEPAL)
- Rafid Hasan Khan
- S Naveen Kumar, Ernst & Young (Chennai), Security Analyst
- Satish Khadka
- Sourajeet Majumder
- Wai Yan Aung
- Peleg Hadar from SafeBreach Labs
- Ahmad Halabi
- Moaied Nagi Hassan(moonlight)
- Mustafa Diaa (@c0braBaghdad1 )
- Sourajeet Majumder
- Wai Yan Aung
- Pankaj Kumar Thakur (Nepal)
- Mustafa Diaa (@c0braBaghdad1 )
- Wai Yan Aung
- Athanasios Tserpelis of Telspace Systems
- Mohammed Ahmad
- Wai Yan Aung
- Naufal Septiadi
- Sattar Jabbar
- S1mba Lu
- Leron Gray
- Mark Wemhöner
- Matt Cundari
- Abdualrhman Muzamil ( RespondTeam.com )
- Harsh Joshi
- Khun Myat
- Mustafa Diaa (@c0braBaghdad1 )
- Nyi Htet Aung
- Tao SAUVAGE
- Zika Ds
- Aamir Usman Khan
- Khun Myat
- Ko Ko Naing
- Mustafa Diaa ( @c0braBaghdad1 )
- Nyi Htet Aung
- Pranshu Tiwari
- Tarun Mahour
- Wai Yan Aung
- Tao Sauvage, IOActive, Senior Security Consultant
- Priyanshu Gupta
- Wai Yan Aung
- Talib Osmani
- Javier Aguinaga
- Chaoyi Lu
- Resecurity International
- Salman Sajid Khan
- Tijo Davis
- Roy Solberg
- CodeBreaker of STARLabs
- Ronnie
- Mustafa Kemal Can
- Jesus Arturo Espinoza Soto
- Wai Yan Aung
- JAIMEivanM mendoza ribera
- Suraj Gourkar
- Sabeer Bijapur
- Hamza Mandil
- bharat
- Mustafa Khan
- AbdelRhman Adel
- Mohammed Adam
- Thejus Krishnan
- Numan ÖZDEMİR
- Hazem Osama
- Pyae Phyoe Thu
- Hein Thant Zin
- Ram Makwana
- Wai Yan Aung
- Himanshu Rahi
- Ashik S N
- Dhiyaneshwaran
- Wai Yan Aung
- Pratik Raut
- CYBERNETIV DIGITAL
- Duda, Przemyslaw
- Ruikai Liu
- Fakhri Zulkifli
- Matthew Cundari
- Deepanshu Tyagi
- Mayank
- Baiqing Lyu (吕柏庆)
- El-Staifi
- Wai Yan Aung
- Bill Ben Haim
- Sumit Sahoo
- Lakshay Gupta
- tty0
- Rick Ramgattie
- Nishant Saurav
- Mohammed Adel
- Wai Yan Aung
- Pethuraj M
- Lawrence Amer
- Alban Cenaj
- Wai Yan Aung
- Yeasir Arafat
- Anil Tom
- Sara Badran
- Yonghui Han of Fortinet's FortiGuard Labs
- Dmitriy Alekseev
- Fish Getachew
- Nathu Nandwani
- Nicodemo Gawronski & Ana Maria Popescu @amiutza
- Diego Juarez from Core Security Technologies for Elevation of Privilege vulnerability in Asus Aura Sync.
- Mohamed A. Baset of Seekurity.com SAS de C.V.
- Emad Abou Shanab
- Konduru Jashwanth
- Nikhil Srivastava
- Dan Nino I. Fabro.
- Kunal Bahl
- HaoTian Xiang
- Niv Levi
- Chris Wood
- Vasim Shaikh (India)
- Wen Bin Kong
- Florian Kunushevci
- Pritesh Mistry
- Ismail Tasdelen
- Dipak Prajapati
- Vasim Shaikh (India)
- Akaash M. Sharma
- Kushal Sharma
- Adesh Nandkishor Kolte
- Chirag Gupta
- Osanda Malith Jayathissa (@OsandaMalith)
- Chacko K Abraham
- Suvadip Kar
- Ankit Singh Nikhil Sahoo and Ipsita Subhadarshan Sahoo
- Yassine Nafiai
- Guy Arazi
- Blazej Adamczyk
- Joaquim Espinhara
- Beyond Security’s SecuriTeam Secure Disclosure program
- David Maciejak of Fortinet's FortiGuard Labs
- Ketankumar Godhani
- Ankit Singh
- Junaid Farhan
- Daniel Diez
- Sankalpa Nirmana
- Vyshnav Vizz
- Samet Şahin
- Ranjeet Jaiswal
- Yoko
- Sreedeep Ck Alavil
- Cool Alfaiz
- Manav Infosec
- Mohammad Abdullah
- Cool Alfaiz
- CDL
- Kishan Kumar
- Yunus Yildirim
- Muhammad Hammad
- Chris
- Steave Afters
- Jhack
联系我们
如果您对安全公告页面有任何疑问、意见、建议,请联系:security@asus.com.
自2020年以来推出的所有华硕路由器均将接受至少三年的安全更新。