CVE-2021-41435
CVSS V2 High 10
CVSS V3 Critical 9.8
Description
A brute-force protection bypass in CAPTCHA protection in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) before 3.0.0.4.386.45898, and RT-AX68U before 3.0.0.4.386.45911, allows a remote attacker to attempt any number of login attempts via sending a specific HTTP request.
Overview
- CVE ID
- CVE-2021-41435
- Assigner
- cve@mitre.org
- Vulnerability Status
- Analyzed
- Published Version
- 2021-11-19T12:15:09
- Last Modified Date
- 2021-11-23T18:29:59
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:o:asus:gt-ax11000_firmware:*:*:*:*:*:*:*:* | 1 | OR | 3.0.0.4.386.45898 | |
cpe:2.3:h:asus:gt-ax11000:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:asus:rt-ax3000_firmware:*:*:*:*:*:*:*:* | 1 | OR | 3.0.0.4.386.45898 | |
cpe:2.3:h:asus:rt-ax3000:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:asus:rt-ax55_firmware:*:*:*:*:*:*:*:* | 1 | OR | 3.0.0.4.386.45898 | |
cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:asus:rt-ax56u_firmware:*:*:*:*:*:*:*:* | 1 | OR | 3.0.0.4.386.45898 | |
cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:asus:rt-ax56u_v2_firmware:*:*:*:*:*:*:*:* | 1 | OR | 3.0.0.4.386.45898 | |
cpe:2.3:h:asus:rt-ax56u_v2:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:asus:rt-ax58u_firmware:*:*:*:*:*:*:*:* | 1 | OR | 3.0.0.4.386.45898 | |
cpe:2.3:h:asus:rt-ax58u:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:asus:rt-ax82u_firmware:*:*:*:*:*:*:*:* | 1 | OR | 3.0.0.4.386.45898 | |
cpe:2.3:h:asus:rt-ax82u:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:asus:rt-ax82u_gundam_edition_firmware:*:*:*:*:*:*:*:* | 1 | OR | 3.0.0.4.386.45898 | |
cpe:2.3:h:asus:rt-ax82u_gundam_edition:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:asus:rt-ax82u_gundam_edition_firmware:*:*:*:*:*:*:*:* | 1 | OR | 3.0.0.4.386.45898 | |
cpe:2.3:h:asus:rt-ax82u_gundam_edition:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:asus:rt-ax86u_firmware:*:*:*:*:*:*:*:* | 1 | OR | 3.0.0.4.386.45898 | |
cpe:2.3:h:asus:rt-ax86u:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:asus:rt-ax86s_firmware:*:*:*:*:*:*:*:* | 1 | OR | 3.0.0.4.386.45898 | |
cpe:2.3:h:asus:rt-ax86s:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:asus:rt-ax86u_zaku_ii_edition_firmware:*:*:*:*:*:*:*:* | 1 | OR | 3.0.0.4.386.45898 | |
cpe:2.3:h:asus:rt-ax86u_zaku_ii_edition:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:asus:rt-ax88u_firmware:*:*:*:*:*:*:*:* | 1 | OR | 3.0.0.4.386.45898 | |
cpe:2.3:h:asus:rt-ax88u:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:asus:rt-ax92u_firmware:*:*:*:*:*:*:*:* | 1 | OR | 3.0.0.4.386.45898 | |
cpe:2.3:h:asus:rt-ax92u:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:asus:tuf_gaming_ax3000_firmware:*:*:*:*:*:*:*:* | 1 | OR | 3.0.0.4.386.45898 | |
cpe:2.3:h:asus:tuf_gaming_ax3000:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:asus:tuf-ax5400_firmware:*:*:*:*:*:*:*:* | 1 | OR | 3.0.0.4.386.45898 | |
cpe:2.3:h:asus:tuf-ax5400:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:asus:zenwifi_xd6_firmware:*:*:*:*:*:*:*:* | 1 | OR | 3.0.0.4.386.45898 | |
cpe:2.3:h:asus:zenwifi_xd6:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:asus:zenwifi_ax_\(xt8\)_firmware:*:*:*:*:*:*:*:* | 1 | OR | 3.0.0.4.386.45898 | |
cpe:2.3:h:asus:zenwifi_ax_\(xt8\):-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:asus:rt-ax68u_firmware:*:*:*:*:*:*:*:* | 1 | OR | 3.0.0.4.386.45911 | |
cpe:2.3:h:asus:rt-ax68u:-:*:*:*:*:*:*:* | 0 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:L/Au:N/C:C/I:C/A:C
- Access Vector
- NETWORK
- Access Compatibility
- LOW
- Authentication
- NONE
- Confidentiality Impact
- COMPLETE
- Integrity Impact
- COMPLETE
- Availability Impact
- COMPLETE
- Base Score
- 10
- Severity
- HIGH
- Exploitability Score
- 10
- Impact Score
- 10
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- HIGH
- Base Score
- 9.8
- Base Severity
- CRITICAL
- Exploitability Score
- 3.9
- Impact Score
- 5.9
References
Reference URL | Reference Tags |
---|---|
https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX56U/HelpDesk_BIOS/ | Product Vendor Advisory |
https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX3000/HelpDesk_BIOS/ | Product Vendor Advisory |
https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-AX-XT8-/HelpDesk_BIOS/ | Product Vendor Advisory |
https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/All-series/RT-AX55/HelpDesk_BIOS/ | Product Vendor Advisory |
http://asus.com | Vendor Advisory |
https://rog.asus.com/networking/rog-rapture-gt-ax11000-model/helpdesk_bios | Product Vendor Advisory |
https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX68U/HelpDesk_BIOS/ | Product Vendor Advisory |
https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-XD6/HelpDesk_BIOS/ | Product Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2021-41435 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41435 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 06:45:16 | Added to TrackCVE | |||
2022-12-05 14:53:16 | 2021-11-19T12:15Z | 2021-11-19T12:15:09 | CVE Published Date | updated |
2022-12-05 14:53:16 | 2021-11-23T18:29:59 | CVE Modified Date | updated | |
2022-12-05 14:53:16 | Analyzed | Vulnerability Status | updated |