{"id":5383,"date":"2023-09-09T20:07:59","date_gmt":"2023-09-09T18:07:59","guid":{"rendered":"https:\/\/sajberinfo.com\/?p=5383"},"modified":"2023-09-09T20:07:59","modified_gmt":"2023-09-09T18:07:59","slug":"asus-ruter-ranjivosti","status":"publish","type":"post","link":"https:\/\/sajberinfo.com\/en\/2023\/09\/09\/asus-ruter-ranjivosti\/","title":{"rendered":"Asus ruter ranjivosti"},"content":{"rendered":"<p><span style=\"font-size: 14pt;\">Sigurnosni istra\u017eiva\u010di su nedavno otkrili <a href=\"https:\/\/www.twcert.org.tw\/tw\/lp-132-1-1-60.html\" target=\"_blank\" rel=\"noopener\">tri bezbjednosna propusta<\/a> koje uti\u010du na nekoliko modela <em>Asus<\/em> rutera. Od toga, jedna grupa ure\u0111aja ima propuste koji su ozna\u010deni kao kriti\u010dni, sa ocjenom <em>CVSS 9.8<\/em>, dok je manji broj njih pogo\u0111en ranjivo\u0161\u0107u visokog rizika sa <em>CVSS<\/em> ocjenom <em>8.8<\/em>.<\/span><\/p>\n<div id=\"attachment_5384\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-5384\" class=\"size-full wp-image-5384\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/09\/asus.jpg\" alt=\"Asus Wifi\" width=\"1024\" height=\"483\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/09\/asus.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/09\/asus-300x142.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/09\/asus-768x362.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/09\/asus-18x8.jpg 18w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/09\/asus-520x245.jpg 520w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/09\/asus-720x340.jpg 720w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-5384\" class=\"wp-caption-text\"><em><a href=\"https:\/\/www.freepik.com\/free-vector\/wifi-router-front-angle-side-view-mockup_12760670.htm#query=asus%20router&amp;position=28&amp;from_view=search&amp;track=ais\" target=\"_blank\" rel=\"nofollow noopener\">Image by upklyak<\/a> on Freepik<\/em><\/p><\/div>\n<h2><span style=\"font-size: 14pt;\"><strong>\u0160ta znamo o <em>Asus<\/em> ruter ranjivostima?<\/strong><\/span><\/h2>\n<p><span style=\"font-size: 14pt;\">Korisnici koji imaju <em>Asus<\/em> rutere trebalo bi da obrate pa\u017enju, jer bi se njihovi ure\u0111aji mogli iskoristiti za daljinske napade. Nekoliko kriti\u010dnih ranjivosti koji je otkrio <em>Tajvanski CERT<\/em> omogu\u0107avaju <a href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/19\/hakeri-crni-sesiri-epizoda-3\/\" target=\"_blank\" rel=\"noopener\">zlonamjernim akterima<\/a> da izvr\u0161avaju k\u00f4d i proizvoljne operacije na ranjivim ure\u0111ajima koji ne koriste najnovije verzije upravlja\u010dkog softvera (eng. <em>firmware<\/em>).<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Konkretno, radi se o tri modela ure\u0111aja \u2013 <em>Asus RT-AX55, RT-AX56U_V2<\/em> i <em>RT-AC86U<\/em> \u2013 koji su ranjavi na ranjivosti ozna\u010dene kao <a href=\"https:\/\/www.twcert.org.tw\/tw\/cp-132-7354-4e654-1.html\" target=\"_blank\" rel=\"nofollow noopener\"><em>CVE-2023-39238<\/em><\/a>, <a href=\"https:\/\/www.twcert.org.tw\/tw\/cp-132-7355-0ce8d-1.html\" target=\"_blank\" rel=\"nofollow noopener\"><em>CVE-2023-39239<\/em><\/a> i <a href=\"https:\/\/www.twcert.org.tw\/tw\/cp-132-7356-021bf-1.html\" target=\"_blank\" rel=\"nofollow noopener\"><em>CVE-2023-39240<\/em><\/a> koji se odnose na <em>API<\/em>-je koji rukuju administrativnim funkcijama. Ove gre\u0161ke u nizu formata propu\u0161taju korisni\u010dki unos koji nije verifikovan ili drugim rije\u010dima, unos koji ne bi trebalo da bude dozvoljen mo\u017ee da pro\u0111e. Udaljeni napada\u010d mo\u017ee zatim daljinski unijeti posebno kreiran tekst na pogo\u0111eni ure\u0111aj da bi pokrenuo sopstveni k\u00f4d, prekinuo operacije ili izvr\u0161io proizvoljne operacije.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-size: 14pt;\"><strong>Za\u0161tita ure\u0111aja<\/strong><\/span><\/h3>\n<p><span style=\"font-size: 14pt;\">Lo\u0161a vijest za korisnike je da ih ne a\u017eurirani ure\u0111aji ostavljaju otvorenim za napad, omogu\u0107avaju\u0107i napada\u010dima infiltriranje i isporuku zlonamjernog softvera na povezane ure\u0111aje. Sa druge strane, dobra vijest je da je kompanija <em>Asus<\/em> ve\u0107 objavila dostupna a\u017euriranja koji ispravljaju ove ranjivosti.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Korisnici bi trebalo da provjere upravlja\u010dki softver na svojim <em>Asus<\/em> ruterima i da svoje ure\u0111aje a\u017euriraju na:<\/span><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><span style=\"font-size: 14pt;\"><a href=\"https:\/\/www.asus.com\/networking-iot-servers\/wifi-routers\/all-series\/rt-ax55\/helpdesk_bios\/?model2Name=RT-AX55\" target=\"_blank\" rel=\"nofollow noopener\"><em>RT-AX55<\/em><\/a><em>: 3.0.0.4.386_51948<\/em> ili novije.<\/span><\/li>\n<li><span style=\"font-size: 14pt;\"><a href=\"https:\/\/www.asus.com\/networking-iot-servers\/wifi-6\/all-series\/rt-ax56u\/helpdesk_bios\/?model2Name=RT-AX56U\" target=\"_blank\" rel=\"nofollow noopener\"><em>RT-AX56U_V2<\/em><\/a><em>: 3.0.0.4.386_51948<\/em> ili novije.<\/span><\/li>\n<li><span style=\"font-size: 14pt;\"><a href=\"https:\/\/www.asus.com\/supportonly\/rt-ac86u\/helpdesk_bios\/?model2Name=RT-AC86U\" target=\"_blank\" rel=\"nofollow noopener\"><em>RT-AC86U<\/em><\/a><em>: 3.0.0.4.386_51915<\/em> ili novije.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;\">Korisnici mogu preuzeti zadnja dostupna a\u017euriranja sa linkova iznad i primijeniti na svom ure\u0111aju preko <em>web GUI<\/em> interfejsa ili na lak\u0161i na\u010din kori\u0161tenjem opcije a\u017euriranja u samom ure\u0111aju. Kod ve\u0107ine <em>Asus<\/em> rutera, korisnici se moraju se prijaviti na svoj ruter, i\u0107i na opciju <em>Administration<\/em> i kliknuti na karticu <em>Firmware<\/em> <em>Upgrade<\/em>. Tu korisnici mogu provjeriti da li postoji novo a\u017euriranje upravlja\u010dkog softvera klikom na dugme \u201c<em>Check<\/em>\u201d pod opcijom <em>Firmware Version<\/em>. Ako je dostupno novo a\u017euriranje, korisnici ga mogu primijeniti. Kako bi bili sigurni da je ruter uvijek a\u017euriran, mo\u017ee se uklju\u010diti opcija <em>Auto Firmware Upgrade<\/em>.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-size: 14pt;\"><strong>Zaklju\u010dak<\/strong><\/span><\/h4>\n<p><span style=\"font-size: 14pt;\">Korisnici koji imaju jedan od navedenih <em>Asus<\/em> rutera trebalo bi odmah da provjere i a\u017euriraju svoje ure\u0111aje. Tako\u0111e, korisnicima je preporuka da nakon provjere i a\u017euriranja svojih ure\u0111aja isklju\u010de daljinski pristup svom ure\u0111aju.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Sigurnosni istra\u017eiva\u010di su nedavno otkrili tri bezbjednosna propusta koje uti\u010du na nekoliko modela Asus rutera. Od toga, jedna grupa ure\u0111aja ima propuste koji su ozna\u010deni kao kriti\u010dni, sa ocjenom CVSS 9.8, dok je manji&#46;&#46;&#46;<\/p>","protected":false},"author":1,"featured_media":5384,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[528,161,126],"class_list":["post-5383","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hronike","tag-asus","tag-router","tag-vulnerability"],"_links":{"self":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/5383","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/comments?post=5383"}],"version-history":[{"count":0,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/5383\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media\/5384"}],"wp:attachment":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media?parent=5383"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/categories?post=5383"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/tags?post=5383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}