A vulnerability has been identified in the Asus RT-N12+ B1, specifically related to how the router stores its sensitive information (passwords) in cleartext in its database. Users risk security threats as cleartext passwords are easily accessible/readable as they do not utilize encryption technology. Immediate action is recommended to address this critical flaw to enhance the router’s security.
Asus RT-N12+ B1 router stores credentials in cleartext, risking unauthorized access, router manipulation, and potential data exposure. Immediate action is essential for remediation.
Asus has officially declared that the RT-N12+ B1 (RT-N300 B1) router has reached the end of its product life cycle. Consequently, firmware maintenance and updates for this model were discontinued years ago. This cessation of support leaves the device vulnerable to existing security flaws within its firmware.
Asus has indicated that a beta version of the router’s firmware is now available for testing. These companies seek user feedback to evaluate if this beta version addresses any identified issues. The beta firmware can be accessed and reviewed via the following link: [link]
Asus has indicated that upon examination, they’ve determined that the firmware size for this model is excessively large, and the product has reached the end of its life cycle, posing challenges for ongoing maintenance.
Additionally, they have provided a beta firmware version for the router firmware. They’ve requested feedback on whether the provided firmware effectively addresses the identified issues. You can access the beta firmware file through the following link: [Asus Beta Firmware]
The Asus RT-N12+ B1 router is susceptible to a critical security vulnerability known as “credentials stored in cleartext”. This flaw arises from the insecure practice of storing passwords in cleartext within the router’s database. Therefore, malicious actors can exploit this vulnerability to gain unauthorized access and manipulate the router’s login credentials.
Asus router stores passwords in cleartext in its database, if an unauthorized individual obtains access to the router firmware/database. They can easily read the cleartext passwords and manipulate and gain access to the router.
The vulnerability of Credentials Stored in Cleartext is to avoid storing passwords in plaintext. Instead, use secure credential management solutions that hash or encrypt passwords before storage.
Redfox Security is a diverse network of expert security consultants with a global mindset and a collaborative culture. If you are looking to improve your organization’s security posture, contact us today to discuss your security testing needs. Our team of security professionals can help you identify vulnerabilities and weaknesses in your systems and provide recommendations to remediate them.
“Join us on our journey of growth and development by signing up for our comprehensive courses.”
Redfox Cyber Security Inc.
8 The Green, Ste. A, Dover,
Delaware 19901,
United States.
info@redfoxsec.com
©️2024 Redfox Cyber Security Inc. All rights reserved.