Known Exploited Vulnerabilities CVE-2023-39780

ASUS RT-AX55 devices contain an OS command injection vulnerability that could allow a remote, authenticated attacker to execute arbitrary commands. As represented by CVE-2023-41346.

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
CVE-2023-39780 ASUS RT-AX55 Routers OS Command Injection Vulnerability exploitation_technique T1133 External Remote Services
Comments
Attackers have gained access to affected ASUS routers by using brute-force login attempts and authentication bypasses, allowing them to inject and execute commands to enable SSH. Additionally, they can place a backdoor in the NVRAM.
References
CVE-2023-39780 ASUS RT-AX55 Routers OS Command Injection Vulnerability exploitation_technique T1078 Valid Accounts
Comments
Attackers have gained access to affected ASUS routers by using brute-force login attempts and authentication bypasses, allowing them to inject and execute commands to enable SSH. Additionally, they can place a backdoor in the NVRAM.
References
CVE-2023-39780 ASUS RT-AX55 Routers OS Command Injection Vulnerability exploitation_technique T1588 Obtain Capabilities
Comments
Attackers have gained access to affected ASUS routers by using brute-force login attempts and authentication bypasses, allowing them to inject and execute commands to enable SSH. Additionally, they can place a backdoor in the NVRAM.
References
CVE-2023-39780 ASUS RT-AX55 Routers OS Command Injection Vulnerability primary_impact T1059.004 Unix Shell
Comments
Attackers have gained access to affected ASUS routers by using brute-force login attempts and authentication bypasses, allowing them to inject and execute commands to enable SSH. Additionally, they can place a backdoor in the NVRAM.
References
CVE-2023-39780 ASUS RT-AX55 Routers OS Command Injection Vulnerability secondary_impact T1021.004 SSH
Comments
Attackers have gained access to affected ASUS routers by using brute-force login attempts and authentication bypasses, allowing them to inject and execute commands to enable SSH. Additionally, they can place a backdoor in the NVRAM.
References