ID

VAR-201807-0053


CVE

CVE-2016-6557


TITLE

ASUS RP-AC52 contains multiple vulnerabilities

Trust: 0.8

sources: CERT/CC: VU#763843

DESCRIPTION

In ASUS RP-AC52 access points with firmware version 1.0.1.1s and possibly earlier, the web interface, the web interface does not sufficiently verify whether a valid request was intentionally provided by the user. An attacker can perform actions with the same permissions as a victim user, provided the victim has an active session and is induced to trigger the malicious request. ASUS RP-AC52 Access Point is prone to the following multiple security issues: 1. Cross-site request-forgery vulnerability 2. A command-injection vulnerability An attacker may leverage these issues to perform certain unauthorized actions and gain access to the affected application or execute commands in the context of the affected application. A remote attacker could exploit this vulnerability to modify settings and take complete control of the system

Trust: 2.7

sources: NVD: CVE-2016-6557 // CERT/CC: VU#763843 // JVNDB: JVNDB-2016-009196 // BID: 93596 // VULHUB: VHN-95377

AFFECTED PRODUCTS

vendor:asusmodel:rp-ac56scope:eqversion: -

Trust: 1.6

vendor:asusmodel:rp-n14scope:eqversion: -

Trust: 1.6

vendor:asusmodel:ea-n66scope:eqversion: -

Trust: 1.6

vendor:asusmodel:wmp-n12scope:eqversion: -

Trust: 1.6

vendor:asusmodel:rp-n53scope:eqversion: -

Trust: 1.6

vendor:asusmodel:rp-n12scope:eqversion: -

Trust: 1.6

vendor:asusmodel:rp-ac52scope:lteversion:1.0.1.1s

Trust: 1.0

vendor:asustek computermodel: - scope: - version: -

Trust: 0.8

vendor:asustek computermodel:ea-n66scope: - version: -

Trust: 0.8

vendor:asustek computermodel:rp-ac52scope:lteversion:1.0.1.1s

Trust: 0.8

vendor:asustek computermodel:rp-ac56scope: - version: -

Trust: 0.8

vendor:asustek computermodel:rp-n12scope: - version: -

Trust: 0.8

vendor:asustek computermodel:rp-n14scope: - version: -

Trust: 0.8

vendor:asustek computermodel:rp-n53scope: - version: -

Trust: 0.8

vendor:asustek computermodel:wmp-n12scope: - version: -

Trust: 0.8

vendor:asusmodel:rp-ac52scope:eqversion:1.0.1.1s

Trust: 0.6

vendor:asusmodel:rp-ac52 1.0.1.1sscope: - version: -

Trust: 0.3

sources: CERT/CC: VU#763843 // BID: 93596 // JVNDB: JVNDB-2016-009196 // CNNVD: CNNVD-201610-445 // NVD: CVE-2016-6557

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-6557
value: HIGH

Trust: 1.0

NVD: CVE-2016-6557
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201610-445
value: HIGH

Trust: 0.6

VULHUB: VHN-95377
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-6557
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-95377
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-6557
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-95377 // JVNDB: JVNDB-2016-009196 // CNNVD: CNNVD-201610-445 // NVD: CVE-2016-6557

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.9

sources: VULHUB: VHN-95377 // JVNDB: JVNDB-2016-009196 // NVD: CVE-2016-6557

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201610-445

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-201610-445

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-009196

PATCH

title:RP-AC52url:https://www.asus.com/Networking/RPAC52/

Trust: 0.8

title:ASUS RP-AC52 Access Point Fixes for cross-site request forgery vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=99591

Trust: 0.6

sources: JVNDB: JVNDB-2016-009196 // CNNVD: CNNVD-201610-445

EXTERNAL IDS

db:CERT/CCid:VU#763843

Trust: 3.6

db:NVDid:CVE-2016-6557

Trust: 2.8

db:BIDid:93596

Trust: 2.0

db:JVNid:JVNVU96741452

Trust: 0.8

db:JVNDBid:JVNDB-2016-009196

Trust: 0.8

db:CNNVDid:CNNVD-201610-445

Trust: 0.7

db:VULHUBid:VHN-95377

Trust: 0.1

sources: CERT/CC: VU#763843 // VULHUB: VHN-95377 // BID: 93596 // JVNDB: JVNDB-2016-009196 // CNNVD: CNNVD-201610-445 // NVD: CVE-2016-6557

REFERENCES

url:https://www.kb.cert.org/vuls/id/763843

Trust: 2.8

url:https://www.securityfocus.com/bid/93596

Trust: 1.7

url:about vulnerability notes

Trust: 0.8

url:contact us about this vulnerability

Trust: 0.8

url:provide a vendor statement

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6557

Trust: 0.8

url:https://jvn.jp/vu/jvnvu96741452/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2016-6557

Trust: 0.8

url:http://www.asus.com

Trust: 0.3

sources: CERT/CC: VU#763843 // VULHUB: VHN-95377 // BID: 93596 // JVNDB: JVNDB-2016-009196 // CNNVD: CNNVD-201610-445 // NVD: CVE-2016-6557

CREDITS

Ian Smith.

Trust: 0.9

sources: BID: 93596 // CNNVD: CNNVD-201610-445

SOURCES

db:CERT/CCid:VU#763843
db:VULHUBid:VHN-95377
db:BIDid:93596
db:JVNDBid:JVNDB-2016-009196
db:CNNVDid:CNNVD-201610-445
db:NVDid:CVE-2016-6557

LAST UPDATE DATE

2024-11-23T22:00:28.240000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#763843date:2016-10-28T00:00:00
db:VULHUBid:VHN-95377date:2019-10-09T00:00:00
db:BIDid:93596date:2016-10-26T00:08:00
db:JVNDBid:JVNDB-2016-009196date:2018-10-02T00:00:00
db:CNNVDid:CNNVD-201610-445date:2019-10-17T00:00:00
db:NVDid:CVE-2016-6557date:2024-11-21T02:56:21.063

SOURCES RELEASE DATE

db:CERT/CCid:VU#763843date:2016-10-17T00:00:00
db:VULHUBid:VHN-95377date:2018-07-13T00:00:00
db:BIDid:93596date:2016-10-17T00:00:00
db:JVNDBid:JVNDB-2016-009196date:2018-10-02T00:00:00
db:CNNVDid:CNNVD-201610-445date:2016-10-18T00:00:00
db:NVDid:CVE-2016-6557date:2018-07-13T20:29:00.817