Asus RT-N12+ B1's Credentials Stored in Cleartext - CVE‐2024‐28325

A vulnerability has been identified in the Asus RT-N12+ B1, specifically related to how the router stores its sensitive information (passwords) in cleartext in its database. Users risk security threats as cleartext passwords are easily accessible/readable as they do not utilize encryption technology. Immediate action is recommended to address this critical flaw to enhance the router’s security.

Impact of the Vulnerability

Asus RT-N12+ B1 router stores credentials in cleartext, risking unauthorized access, router manipulation, and potential data exposure. Immediate action is essential for remediation.

Timeline:

  • Initial Contact: 21/2/2024 – Report submitted to Asus, outlining the vulnerability.
  • Follow-up Contact 2: 28/02/2024 – First follow-up communication with Asus.
  • Asus Revert Back: 05/03/2024 – Acknowledgment received from Asus.

Asus has officially declared that the RT-N12+ B1 (RT-N300 B1) router has reached the end of its product life cycle. Consequently, firmware maintenance and updates for this model were discontinued years ago. This cessation of support leaves the device vulnerable to existing security flaws within its firmware.

Asus has indicated that a beta version of the router’s firmware is now available for testing. These companies seek user feedback to evaluate if this beta version addresses any identified issues. The beta firmware can be accessed and reviewed via the following link: [link]

  • Follow-up Contact 3: 01/04/2024 – Second follow-up communication with Asus.
  • Asus Revert Back: 01/04/2024 – Acknowledgment received from Asus.
  • Follow-up Contact 4: 02/04/2024 – Third follow-up communication with Asus.
  • Asus Revert Back: 12/04/2024 – Continued follow-up communication with Asus.

Asus has indicated that upon examination, they’ve determined that the firmware size for this model is excessively large, and the product has reached the end of its life cycle, posing challenges for ongoing maintenance.

Additionally, they have provided a beta firmware version for the router firmware. They’ve requested feedback on whether the provided firmware effectively addresses the identified issues. You can access the beta firmware file through the following link: [Asus Beta Firmware]

Vulnerability Description:

The Asus RT-N12+ B1 router is susceptible to a critical security vulnerability known as “credentials stored in cleartext”. This flaw arises from the insecure practice of storing passwords in cleartext within the router’s database. Therefore, malicious actors can exploit this vulnerability to gain unauthorized access and manipulate the router’s login credentials.

Proof-of-Concept:

Asus router stores passwords in cleartext in its database, if an unauthorized individual obtains access to the router firmware/database. They can easily read the cleartext passwords and manipulate and gain access to the router.

Mitigation

The vulnerability of Credentials Stored in Cleartext is to avoid storing passwords in plaintext. Instead, use secure credential management solutions that hash or encrypt passwords before storage.

TL;DR
  • Asus RT-N12+ B1 router stores credentials in plaintext, posing a security risk.
  • Vulnerability allows unauthorized access and manipulation of router login credentials.
  • Mitigation involves implementing secure credential management solutions.
  • Immediate action is crucial for remediation to prevent potential data exposure.

Redfox Security is a diverse network of expert security consultants with a global mindset and a collaborative culture. If you are looking to improve your organization’s security posture, contact us today to discuss your security testing needs. Our team of security professionals can help you identify vulnerabilities and weaknesses in your systems and provide recommendations to remediate them.

“Join us on our journey of growth and development by signing up for our comprehensive courses.”