What's new
  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

“GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers”

That CVE is from September 2023. 386.14_2 was released over a year later, in November 2024.
 
So having the latest firmware installed and performing a factory reset is all that is needed to avoid this issue?
AND: Disable the WAN-Acces to router - why the hell you have it turned on? ;)
 
Same article from LifeHacker which gives more technical explanation If You Have an Asus Router, You Need to Check If It's Been Hacked

I think I am not affected b/c the "hacker SSH key" is not in my system. However I am a bit confused. Can you please guide me through a proper fix. Here is my current config:
  • Asus RT-AZ86U Pro, stock firmware 3.0.0.6.102_34349
  • Router Login Password = 28 chars, totally random lower, upper, digits, symbols
  • System settings: Telnet = No, SSH = LAN Only, Pwd Login = no
  • Authorized Keys = only mine (ssh-ed25519)
  • Enable Web Access from WAN = no
  • Enable Access Restrictions = no
Q1. From the article "GreyNoise says attackers used brute-force login attempts (running millions of login attempts until the right match is found) and authentication bypasses (forcing your way in around traditional authentication protocols) to break into these routers". Is it true there is a way to bypass the complexity of the pwd? I could disable SSH on LAN as well but I am a CLI type of person. I like to tinker with the terminal. Hope it is OK.

Q2. The author recommends blocking incoming requests from 4 IP addresses: 101.99.91.151, 101.99.94.173, 79.141.163.179, 111.90.146.237. Can I go a bit more strict? Block ALL unsolicited incoming requests. The way I use my router, the only legitimate incoming traffic is a response to an outgoing request originated from the home network. If "blocking all unsolicited incoming requests" is a valid security setting, can you please show me how to do that? Attached is a screenshot showing the Firewall settings. All default, excepted "Enable DoS protection" has been enabled.
 

Attachments

  • AsusRTAX86UPro_Firewall.jpg
    AsusRTAX86UPro_Firewall.jpg
    100 KB · Views: 14
Last edited:
If "blocking all unsolicited incoming requests" is a valid security setting, can you please show me how to do that?
This is the default behavior of the firewall. But when the exploit enables SSH on WAN, it opens the firewall for the SSH port.
 
This is the default behavior of the firewall. But when the exploit enables SSH on WAN, it opens the firewall for the SSH port.
As unsollicited incoming requests are dropped by default, I assume Asus routers are immune to the attack described by GreyNoise. So the 9000+ routers which are reported as "infected" are those where the user had explicitly changed the config to allow SSH from WAN, right?

Unless there is another exploit? Which can bypass Asus default settings in maybe old Asus firmware? If so since when (or which stock firmware version) that exploit has been fixed?
 
Last edited:
As unsollicited incoming requests are dropped. If the exploit could do anything to configure the router, does that mean there was/is a security defect somewhere that allow to bypass the firewall?
Based on the write up, the bad guys used another exploit to enable SSH over the WAN using the normal firmware setting. This firmware setting for SSH over the WAN informs the firewall to accept incoming WAN connections on the SSH port. That is normal firmware functionality. Gaining access to the router in the first place is the scary exploit; the persistent SSH access is just the evidence of the exploit.
 

Support SNBForums w/ Amazon

If you'd like to support SNBForums, just use this link and buy anything on Amazon. Thanks!

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Back
Top