¡¾Îó²îͨ¸æ¡¿»ªË¶Â·ÓÉÆ÷Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2023-39238£©
Ðû²¼Ê±¼ä 2023-09-06Ò»¡¢Îó²î¸ÅÊö
CVE ID | CVE-2023-39238 | ·¢Ã÷ʱ¼ä | 2023-09-06 |
Àà ÐÍ | RCE | µÈ ¼¶ | ÑÏÖØ |
¹¥»÷ÏòÁ¿ | ÍøÂç | ËùÐèȨÏÞ | ÎÞ |
¹¥»÷ÖØÆ¯ºó | µÍ | Óû§½»»¥ | ÎÞ |
PoC/EXP | δ¹ûÕæ | ÔÚҰʹÓà | δ֪ |
»ªË¶µçÄԹɷÝÓÐÏÞ¹«Ë¾£¨Æ·ÅÆÃû³ÆASUS£©ÊÇÒ»¼ÒÒÔÌṩÖ÷°å¡¢Ð¡ÎÒ˽¼ÒµçÄÔ¡¢Â·ÓÉÆ÷µÈΪÖ÷µÄ¿ç¹ú¿Æ¼¼ÆóÒµ¡£¡£¡£¡£¡£
9ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬¼øºÚµ£±£ÍøVSRC¼à²âµ½»ªË¶ RT-AX55¡¢RT-AX56U_V2 ºÍ RT-AC86U ·ÓÉÆ÷ÐͺÅÖб£´æ¶à¸öÃûÌÃ×Ö·û´®£¨Format string£©Îó²î£¬£¬£¬£¬£¬£¬ÓÉÓÚijЩº¯ÊýµÄÃûÌÃ×Ö·û´®²ÎÊýÖÐδÂÄÀúÖ¤»òÕûÀíÓû§ÊäÈ룬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÐÅϢй¶ºÍ´úÂëÖ´Ðеȣ¬£¬£¬£¬£¬£¬ÏêÇéÈçÏ£º
CVE-2023-39238£º»ªË¶¶à¿î·ÓÉÆ÷´úÂëÖ´ÐÐÎó²î£¨ÑÏÖØ£©
»ªË¶ RT-AX55¡¢RT-AX56U_V2 ºÍ RT-AC86U ·ÓÉÆ÷ȱÉÙ¶Ôiperf-related APIÄ£¿£¿£¿£¿£¿£¿£¿é¡°ser_iperf3_svr.cgi¡±ÉϵÄÊäÈëÃûÌÃ×Ö·û´®µÄ׼ȷÑéÖ¤£¬£¬£¬£¬£¬£¬Î´¾Éí·ÝÑéÖ¤µÄÔ¶³ÌÍþвÕß¿ÉʹÓøÃÎó²îÔì³ÉЧÀÍÖÐÖ¹¡¢ÔÚÊÜÓ°Ïì×°±¸ÉÏÔ¶³ÌÖ´ÐдúÂë»òÖ´ÐÐí§Òâ²Ù×÷¡£¡£¡£¡£¡£
CVE-2023-39239£º»ªË¶¶à¿î·ÓÉÆ÷´úÂëÖ´ÐÐÎó²î£¨ÑÏÖØ£©
»ªË¶ RT-AX55¡¢RT-AX56U_V2 ºÍ RT-AC86U ·ÓÉÆ÷ÔÚͨÓÃÉèÖú¯ÊýµÄ API ÖÐȱ·¦¶ÔÊäÈëÃûÌÃ×Ö·û´®µÄ׼ȷÑéÖ¤£¬£¬£¬£¬£¬£¬Î´¾Éí·ÝÑéÖ¤µÄÔ¶³ÌÍþвÕß¿ÉʹÓøÃÎó²îÔì³ÉЧÀÍÖÐÖ¹¡¢ÔÚÊÜÓ°Ïì×°±¸ÉÏÔ¶³ÌÖ´ÐдúÂë»òÖ´ÐÐí§Òâ²Ù×÷¡£¡£¡£¡£¡£
CVE-2023-39240£º»ªË¶¶à¿î·ÓÉÆ÷´úÂëÖ´ÐÐÎó²î£¨ÑÏÖØ£©
»ªË¶ RT-AX55¡¢RT-AX56U_V2 ºÍ RT-AC86U ·ÓÉÆ÷ȱÉÙ¶Ôiperf-related APIÄ£¿£¿£¿£¿£¿£¿£¿é¡°ser_iperf3_cli.cgi¡±ÉϵÄÊäÈëÃûÌÃ×Ö·û´®µÄ׼ȷÑéÖ¤£¬£¬£¬£¬£¬£¬Î´¾Éí·ÝÑéÖ¤µÄÔ¶³ÌÍþвÕß¿ÉʹÓøÃÎó²îÔì³ÉЧÀÍÖÐÖ¹¡¢ÔÚÊÜÓ°Ïì×°±¸ÉÏÔ¶³ÌÖ´ÐдúÂë»òÖ´ÐÐí§Òâ²Ù×÷¡£¡£¡£¡£¡£
¶þ¡¢Ó°Ïì¹æÄ£
RT-AX55: 3.0.0.4.386_50460
RT-AX56U_V2: 3.0.0.4.386_50460
RT-AC86U: 3.0.0.4_386_51529
Èý¡¢Çå¾²²½·¥
3.1 Éý¼¶°æ±¾
ÏÖÔÚÕâЩÎó²îÒѾÐÞ¸´£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìÓû§¿ÉÉý¼¶µ½ÒÔϰ汾£º
RT-AX55£º>= 3.0.0.4.386_51948
RT-AX56U_V2£º>= 3.0.0.4.386_51948
RT-AC86U£º>= 3.0.0.4.386_51915
ÏÂÔØÁ´½Ó£º
https://www.asus.com/networking-iot-servers/wifi-routers/all-series/rt-ax55/helpdesk_bios/?model2Name=RT-AX55
https://www.asus.com/supportonly/rt-ac86u/helpdesk_bios/?model2Name=RT-AC86U
3.2 ÔÝʱ²½·¥
ÔÝÎÞ¡£¡£¡£¡£¡£
3.3 ͨÓý¨Òé
l °´ÆÚ¸üÐÂϵͳ²¹¶¡£¡£¡£¡£¡£¬£¬£¬£¬£¬£¬ïÔÌϵͳÎó²î£¬£¬£¬£¬£¬£¬ÌáÉýЧÀÍÆ÷µÄÇå¾²ÐÔ¡£¡£¡£¡£¡£
l ÔöǿϵͳºÍÍøÂçµÄ»á¼û¿ØÖÆ£¬£¬£¬£¬£¬£¬Ð޸ķÀ»ðǽսÂÔ£¬£¬£¬£¬£¬£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻòЧÀÍ£¬£¬£¬£¬£¬£¬ïÔ̽«Î£ÏÕЧÀÍ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬£¬£¬£¬£¬£¬ïÔ̹¥»÷Ãæ¡£¡£¡£¡£¡£
l ʹÓÃÆóÒµ¼¶Çå¾²²úÆ·£¬£¬£¬£¬£¬£¬ÌáÉýÆóÒµµÄÍøÂçÇå¾²ÐÔÄÜ¡£¡£¡£¡£¡£
l ÔöǿϵͳÓû§ºÍȨÏÞÖÎÀí£¬£¬£¬£¬£¬£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔÔò£¬£¬£¬£¬£¬£¬Óû§ºÍÈí¼þȨÏÞÓ¦¼á³ÖÔÚ×îµÍÏÞ¶È¡£¡£¡£¡£¡£
l ÆôÓÃÇ¿ÃÜÂëÕ½ÂÔ²¢ÉèÖÃΪ°´ÆÚÐ޸ġ£¡£¡£¡£¡£
3.4 ²Î¿¼Á´½Ó
https://www.twcert.org.tw/tw/cp-132-7354-4e654-1.html
https://nvd.nist.gov/vuln/detail/CVE-2023-39238
https://www.bleepingcomputer.com/news/security/asus-routers-vulnerable-to-critical-remote-code-execution-flaws/
ËÄ¡¢°æ±¾ÐÅÏ¢
°æ±¾ | ÈÕÆÚ | ±¸×¢ |
V1.0 | 2023-09-06 | Ê×´ÎÐû²¼ |
Îå¡¢¸½Â¼
5.1 ¼øºÚµ£±£Íø¼ò½é
¼øºÚµ£±£Íø½¨ÉèÓÚ1996Ä꣬£¬£¬£¬£¬£¬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ½¨ÉèµÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Çå¾²¸ß¿Æ¼¼ÆóÒµ¡£¡£¡£¡£¡£ÊǺ£ÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Çå¾²²úÆ·¡¢Ç徲ЧÀͽâ¾ö¼Æ»®µÄÁ캽ÆóÒµÖ®Ò»¡£¡£¡£¡£¡£
¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°¼øºÚµ£±£Íø´óÏ㬣¬£¬£¬£¬£¬¹«Ë¾Ô±¹¤6000ÓàÈË£¬£¬£¬£¬£¬£¬Ñз¢ÍŶÓ1200ÓàÈË, ÊÖÒÕЧÀÍÍŶÓ1300ÓàÈË¡£¡£¡£¡£¡£ÔÚÌìϸ÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬£¬£¬£¬£¬£¬ÓµÓÐÁýÕÖÌìϵÄÏúÊÛϵͳ¡¢ÇþµÀϵͳºÍÊÖÒÕÖ§³Öϵͳ¡£¡£¡£¡£¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС£¡£¡£¡£¡££¨¹ÉƱ´úÂ룺002439£©
¶àÄêÀ´£¬£¬£¬£¬£¬£¬¼øºÚµ£±£ÍøÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷Á¢ÒìµÄÇå¾²²úÆ·ºÍ×î¼Ñʵ¼ùЧÀÍ£¬£¬£¬£¬£¬£¬×ÊÖú¿Í»§ÖÜÈ«ÌáÉýÆäIT»ù´¡ÉèÊ©µÄÇå¾²ÐÔºÍÉú²úЧÄÜ£¬£¬£¬£¬£¬£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Çå¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Æð¾¢¡£¡£¡£¡£¡£
5.2 ¹ØÓÚ¼øºÚµ£±£Íø
¼øºÚµ£±£ÍøÇå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸öÎó²îͨ¸æºÍΣº¦Ô¤¾¯£¬£¬£¬£¬£¬£¬ÎÒÃǽ«Ò»Á¬¸ú×ÙÈ«Çò×îеÄÍøÂçÇå¾²ÊÂÎñºÍÎó²î£¬£¬£¬£¬£¬£¬ÎªÆóÒµµÄÐÅÏ¢Çå¾²±£¼Ý»¤º½¡£¡£¡£¡£¡£
¹Ø×¢ÎÒÃÇ£º