HomeNewsASUS Routers Affected by Critical Remote Authentication Bypass Vulnerability
Image – Security Affairs
Technology giant ASUS has recently addressed a critical security flaw that impacts several of its popular router models. The vulnerability, tracked as CVE-2024-3080, is a remote authentication bypass issue that could allow a remote attacker to log into vulnerable devices without any authentication.
The flaw has been assigned a CVSS v3.1 severity score of 9.8 out of 10, indicating it is a critical risk. If successfully exploited, the vulnerability could enable an attacker to take full control of the affected router.
Affected Router Models
The remote authentication bypass vulnerability impacts the following ASUS router models:
ZenWiFi XT8
ZenWiFi XT8 V2
RT-AX88U
RT-AX58U
RT-AX57
RT-AC86U
RT-AC68U
ASUS has released firmware updates to address CVE-2024-3080 for all the affected models. Users are strongly advised to update their routers to the latest available firmware version as soon as possible.
In addition to CVE-2024-3080, ASUS has also patched another critical flaw, CVE-2024-3912, which is an arbitrary firmware upload vulnerability. This could allow a remote unauthenticated attacker to execute commands on vulnerable devices. Multiple router models were affected, with some older end-of-life devices recommended for replacement if the firmware cannot be updated.
Mitigating the Risk
While awaiting the opportunity to install the firmware updates, ASUS recommends some temporary mitigation steps:
Ensure strong passwords or a passphrase (over 15 non-consecutive characters) are set for the router admin account and WiFi network
Disable remote access to the router admin interface from the internet (WAN)
Disable port forwarding, DDNS, VPN server, DMZ, and port triggering features.
Users should also update the Download Master utility on their ASUS routers to version 3.1.0.114 or later to address several other vulnerabilities.
The Importance of Prompt Updates
These vulnerabilities highlight the importance of keeping router firmware up-to-date. Routers are an essential piece of network infrastructure, and unpatched flaws can provide attackers with easy access to the local network and connected devices.
Consumers and businesses alike should ensure they have processes to monitor for router firmware updates and apply them promptly. Enabling automatic updates is highly recommended where possible.
If you suspect your router may have been compromised, immediately disconnect it from the internet and seek assistance from a cyber security professional to investigate and remediate the issue.
Starting in mid-July 2025, Microsoft will begin automatically blocking legacy authentication protocols in Microsoft 365, with full enforcement expected by August 2025. This update addresses…
A critical security vulnerability discovered in Microsoft 365 Copilot highlights that there is a risk associated with AI-powered business tools that we must continue to…
Microsoft has released its June 2025, Patch Tuesday security updates addressing 66 vulnerabilities across its software ecosystem. This month’s release includes one actively exploited zero-day…