ASUS Product Security Advisory

    ASUS Product Security Advisory

    We take every care to ensure that ASUS products are secure in order to protect the privacy of our valued customers. We constantly strive to improve our safeguards for security and personal information in accordance with all applicable laws and regulations, and we welcome all reports from our customers about product-related security or privacy issues. Any information you supply to ASUS will only be used to help resolve the security vulnerabilities or issues you have reported. This process may include contacting you for further relevant information.

    How to report a security vulnerability or issue to ASUS

    We welcome all reports about security-related issues incidents and privacy concerns, and we invite you to contact us about such matters via our dedicated website at https://www.asus.com/securityadvisory/. In order for us to deal swiftly with your concerns, please make sure filling in the following information to the website.

    1. Your full name, and a means of contacting you. This can be an email address, a phone number or any other preferred way we can use to get in touch with you. If you provide a phone number, please include the full country code, area code and extension number (if applicable).
    2. Full and detailed information about the issue you wish to report. This should include the following information, as applicable:
      1. The name of the ASUS service(s) or system(s) that your concern relates to.
      2. The product type, product name and model number of the affected hardware products.
      3. The name, description and version number of any affected ASUS software products.
      4. A full and detailed description of the problem or issue, along with any background information that you believe is relevant, and any other pertinent information that may help us reproduce and/or resolve the issue.

    Responsible reporting guidelines

    ASUS appreciates all contributions from customers and the wider ASUS community that help to improve the security of our products and services. However, we kindly request that you act responsibly and bear in mind the following when investigating or reporting any issues:

    1. Do not attempt to access or modify any ASUS services, systems, products or software without authorization.
    2. Do not disclose, or modify, destroy or misuse any data you may discover.
    3. All information given to or received from any party relating to the reported issues must remain completely confidential.

    What happens next?

    Once we have resolved the reported issue(s), we will provide a suitable solution to all affected customers. We will treat this with the utmost priority and make the solution available as soon as it practical to do so.

    ASUS will also maintain a list of the latest software updates, along with descriptions of the issues that have been fixed. Although we will notify customers wherever possible, we also recommend that customers visit this page regularly to make sure they are aware of the latest updates.

    Latest security updates

    04/14/2020 ASUS Update Regarding Mitigation for Known Intel CPU Vulnerabilities

    ASUS is aware of recent security research disclosing potential security vulnerabilities in Intel® CSME, Intel® SPS, Intel® TXE, Intel® AMT, Intel® PTT and/or Intel® DAL chipsets. These vulnerabilities may result in:

    • Improper privilege changes;
    • Denial of service;
    • Disclosure of information.

    ASUS is working closely with platform owners to provide firmware and software updates for all affected devices, to mitigate potential risks associated with the vulnerabilities that have been identified.

    Symptom Description and ASUS Solutions
    Please refers to Attachment
    https://www.asus.com/websites/global/aboutasus/intel_csme_security.pdf

    Important Notice: ASUS BIOS Update FAQ

    PLEASE FREQUENTLY CHECK FOR INFORMATION ABOUT THE LATEST UPDATES AND ADVISORIES FROM ASUS REGARDING YOUR EQUIPMENT AND SOFTWARE. THE INFORMATION PROVIDED IN THIS ADVISORY IS PROVIDED ON AN “AS IS” BASIS WITHOUT ANY WARRANTY OR GUARANTEE OF ANY KIND. ASUS RESERVES THE RIGHT TO CHANGE OR UPDATE THIS ADVISORY AT ANY TIME WITHOUT NOTICE.

    04/09/2020 ASUS Device Activation Security Update (CVE-2020-10649) for ASUS Notebook PCs

    Vulnerability: CVE-2020-10649

    ASUS has released a new version (1.0.7.0) of ASUS Device Activation for Win 10 notebook PCs that includes important security updates. This latest application update contains fixes for the CVE-2020-10649 vulnerability.

    ASUS recommends that users with Win 10 notebook PCs running ASUS Device Activation version 1.0.6.0 and all prior versions to update to the latest version. To check the installed version of ASUS Device Activation and to download the latest version, visit https://www.asus.com/support/FAQ/1042640 .

    ASUS would like to thank Anas Khan for the assistance with this security update.

    03/18/2020 Security Advisory for CVE-2019-15126 (Kr00k)

    A new firmware update is now available for selected ASUS routers. This latest firmware update contains fixes for the CVE-2019-15126 (Kr00k) vulnerability, which allows unauthorized decryption of some WPA2-encrypted traffic in devices using some Broadcom and Cypress WiFi chips. This includes some ASUS routers.

    We strongly encourage you to periodically audit both your networking equipment and your network security procedures.

    We strongly recommend that you update your router to the latest firmware as soon as the new firmware is released. You will find the latest firmware available for download from the ASUS support page https://www.asus.com/support/, or on each model’s official product page. You will find links to the new firmware for selected ASUS routers at the end of this notice. Please note that updated firmware for some models is still undergoing testing, and will be made available as soon as possible.

    If you have already installed the latest firmware version, please disregard this notice.

    Should you have any questions or concerns, please contact ASUS via our Security Advisory reporting system: https://www.asus.com/securityadvisory/

    For further help with router setup and an introduction to network security, please visit

    https://www.asus.com/support/FAQ/1008000

    https://www.asus.com/support/FAQ/1039292

    Model name Support site path Firmware version Ready time
    GT-AC5300 https://www.asus.com/us/Networking/ROG-Rapture-GT-AC5300/HelpDesk_BIOS/ 384_81686 Now
    RT-AC5300 https://www.asus.com/us/Networking/RT-AC5300/HelpDesk_BIOS/ 384_81624 3/19
    RT-AC86U https://www.asus.com/us/Networking/RT-AC86U/HelpDesk_BIOS/ 384_81352 Now
    RT-AC2900 https://www.asus.com/Networking/RT-AC2900/HelpDesk_BIOS/ 384_81352 Now
    RT-AC3200 https://www.asus.com/Networking/RTAC3200/HelpDesk_BIOS/ 382_51940 3/17
    RT-AC1750_B1 https://www.asus.com/supportonly/RT-AC1750_B1/HelpDesk_BIOS/ 385_20253 Now
    RT-AC1900 https://www.asus.com/Networking/RT-AC1900/HelpDesk_BIOS/ 385_20253 Now
    RT-AC1900P https://www.asus.com/Networking/RT-AC1900P/HelpDesk_BIOS/ 385_20253 Now
    RT-AC1900U https://www.asus.com/Networking/RT-AC1900U/HelpDesk_BIOS/ 385_20253 Now
    RT-AC66U B1 https://www.asus.com/Networking/RT-AC66U-B1/HelpDesk_BIOS/ 385_20253 Now
    RT-AC68P https://www.asus.com/Networking/RTAC68P/HelpDesk_BIOS/ 385_20253 Now
    RT-AC68R https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/ 385_20253 Now
    RT-AC68RF https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/ 385_20253 Now
    RT-AC68RW https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/ 385_20253 Now
    RT-AC68U https://www.asus.com/Networking/RTAC68U/HelpDesk_BIOS/ 385_20253 Now
    RT-AC68U_WHITE https://www.asus.com/us/Networking/RTAC68W/HelpDesk_BIOS/ 385_20253 Now
    RT-AC68W https://www.asus.com/us/Networking/RTAC68W/HelpDesk_BIOS/ 385_20253 Now
    ZenWiFi XT8 https://www.asus.com/Networking/ZenWiFi-AX-XT8/HelpDesk_BIOS/ 386_25217 Now
    RT-AX88U https://www.asus.com/Networking/RT-AX88U/HelpDesk_BIOS/ 3.0.0.4.384.7997 Now
    RT-AX92U https://www.asus.com/Networking/RT-AX92U/HelpDesk_BIOS/ 3.0.0.4.384.8681 Now
    GT-AX11000 https://www.asus.com/us/Networking/ROG-Rapture-GT-AX11000/HelpDesk_BIOS/ 3.0.0.4.384.7997 Now
    RT-AX58U https://www.asus.com/Networking/RT-AX58U/HelpDesk_BIOS/ 3.0.0.4.384.8563 Now
    RT-AC88U https://www.asus.com/us/Networking/RT-AC88U/HelpDesk_BIOS/ 3.0.0.4.384.81790 Now
    RT-AC3100 https://www.asus.com/Networking/RT-AC3100/HelpDesk_BIOS/ 3.0.0.4.385.20457 Now
    RT-AC1200G https://www.asus.com/Networking/RT-AC1200G/HelpDesk_BIOS/ 3.0.0.4.382.51612 Now
    RT-AC1200G https://www.asus.com/Networking/RT-AC1200G-plus/HelpDesk_BIOS/ 3.0.0.4.382.51612 Now
    RT-N12 D1 https://www.asus.com/Networking/RTN12_D1/HelpDesk_BIOS/ 3.0.0.4.380.8292 Now


    03/09/2020 Security Notice for CVE-2018-18287

    Since 2018, ASUS has offered a firmware patch for affected routers to address the CVE-2018-18287 vulnerability, among other important security updates. All later firmware is unaffected.

    ASUS recommends all users to always update their routers with the latest firmware. If a router’s firmware is not updated then ASUS strongly recommends to disable remote access from WAN or AiCloud, as well as resetting the router to its default settings. These steps will maximize security.

    Users who have already installed the latest firmware version may disregard this notice.

    For any questions or concerns, please contact ASUS via our Security Advisory reporting system: https://www.asus.com/securityadvisory/

    For further help with router setup and an introduction to network security, please visit:
    https://www.asus.com/support/FAQ/1008000
    https://www.asus.com/support/FAQ/1039292

    Model name Support site path Firmware version Ready time
    RT-AC58U https://www.asus.com/Networking/RT-AC58U/HelpDesk_Download/ 382_51939 now
    RT-ACRH13 https://www.asus.com/us/Networking/RT-ACRH13/HelpDesk_Download/ 382_51939 now
    RT-AC1750_B1 https://www.asus.com/supportonly/RT-AC1750_B1/HelpDesk_BIOS/ 385_20252 now
    RT-AC1900 https://www.asus.com/Networking/RT-AC1900/HelpDesk_BIOS/ 385_20252 now
    RT-AC1900P https://www.asus.com/Networking/RT-AC1900P/HelpDesk_BIOS/ 385_20252 now
    RT-AC1900U https://www.asus.com/Networking/RT-AC1900U/HelpDesk_BIOS/ 385_20252 now
    RT-AC3200 https://www.asus.com/Networking/RTAC3200/HelpDesk_BIOS/ 382_51939 now
    RT-AC51U https://www.asus.com/Networking/RTAC51U/HelpDesk_BIOS/ 380_8497 now
    RT-AC51U+ https://www.asus.com/Networking/RT-AC51U-plus/HelpDesk_BIOS/ 380_10875 now
    RT-AC52U B1 https://www.asus.com/Networking/RT-AC52U-B1/HelpDesk_Download/ 380_10875 now
    RT-AC66U https://www.asus.com/Networking/RTAC66U/HelpDesk_BIOS/ 382_51641 now
    RT-AC66U B1 https://www.asus.com/Networking/RT-AC66U-B1/HelpDesk_BIOS/ 385_20252 now
    RT-AC66U_WHITE https://www.asus.com/Networking/RTAC66U/HelpDesk_BIOS/ 382_51641 now
    RT-AC68P https://www.asus.com/Networking/RTAC68P/HelpDesk_BIOS/ 385_20252 now
    RT-AC68R https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/ 385_20252 now
    RT-AC68RF https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/ 385_20252 now
    RT-AC58U https://www.asus.com/Networking/RT-AC58U/HelpDesk_Download/ 382_51939 now
    RT-ACRH13 https://www.asus.com/us/Networking/RT-ACRH13/HelpDesk_Download/ 382_51939 now
    RT-AC1750_B1 https://www.asus.com/supportonly/RT-AC1750_B1/HelpDesk_BIOS/ 385_20252 now
    RT-AC1900 https://www.asus.com/Networking/RT-AC1900/HelpDesk_BIOS/ 385_20252 now
    RT-AC1900P https://www.asus.com/Networking/RT-AC1900P/HelpDesk_BIOS/ 385_20252 now
    RT-AC1900U https://www.asus.com/Networking/RT-AC1900U/HelpDesk_BIOS/ 385_20252 now
    RT-AC3200 https://www.asus.com/Networking/RTAC3200/HelpDesk_BIOS/ 382_51939 now
    RT-AC51U https://www.asus.com/Networking/RTAC51U/HelpDesk_BIOS/ 380_8497 now
    RT-AC51U+ https://www.asus.com/Networking/RT-AC51U-plus/HelpDesk_BIOS/ 380_10875 now
    RT-AC52U B1 https://www.asus.com/Networking/RT-AC52U-B1/HelpDesk_Download/ 380_10875 now
    RT-AC66U https://www.asus.com/Networking/RTAC66U/HelpDesk_BIOS/ 382_51641 now
    RT-AC66U B1 https://www.asus.com/Networking/RT-AC66U-B1/HelpDesk_BIOS/ 385_20252 now
    RT-AC66U_WHITE https://www.asus.com/Networking/RTAC66U/HelpDesk_BIOS/ 382_51641 now
    RT-AC68P https://www.asus.com/Networking/RTAC68P/HelpDesk_BIOS/ 385_20252 now
    RT-AC68R https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/ 385_20252 now
    RT-AC68RF https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/ 385_20252 now


    02/14/2020 ROG Gaming Center Package Security Update

    ASUS update the ROG Gaming Center Package that includes important security updates.
    ASUS would like to thank Eli Paz from CyberArk Labs for the assistance with this security update.

    11/26/2019 New firmware update for wireless router RT-AC1750_B1/RT-AC1900/RT-AC1900P/RT-AC1900U/RT-AC86U/RT-AC2900/RT-AC3100/RT-AC3200/RT-AC51U/RT-AC51U+/RT-AC52U B1/RT-AC66U/RT-AC66U B1/RT-AC66U_WHITE/RT-AC67U/RT-AC68P/RT-AC68R/RT-AC68RF/RT-AC68RW/RT-AC68U/RT-AC68U 2 Pack/RT-AC68U_WHITE/RT-AC68W/RT-AC750/RT-AC87R/RT-AC87U/RT-AC87W/RT-N66U/RT-N66U_C1/RT-N14U

    ASUS is releasing a firmware update for selected routers. Our most recent firmware update contains enhanced security protections against unauthorized access, alteration, disclosure of data, malware, phishing and DDoS attacks.

    We strongly encourage you to periodically audit both your equipment and your security procedures, as this will ensure that you will be better protected against unwanted intrusion. As a user of an ASUS router, we advise taking the following actions:

    1. Update your router to the latest firmware. We strongly recommend that you do so as soon as new firmware is released. You will find the latest firmware available for download from the ASUS support page at https://www.asus.com/support/ or the appropriate product page at https://www.asus.com/Networking/. ASUS has provided a link to new firmware for selected routers at the end of this notice.
    2. Set up separate passwords for your wireless network and router-administration page. Use passwords with a length of at least eight characters, including a mix of capital letters, numbers and symbols. Do not use the same password for multiple devices or services.
    3. Enable ASUS AiProtection, if your router supports this feature. Instructions on how to do this can be found in your router’s manual, or on the relevant ASUS support page, at https://www.asus.com/Networking/.


    Please note that if you choose not to install this new firmware version then, to avoid any potential unwanted intrusion, we strongly recommend that you disable remote access from WAN or AiCloud, and reset your router to its default settings.

    If you have already installed the latest firmware version, please disregard this notice.

    Should you have any question or concerns, please contact ASUS via our Security Advisory reporting system: https://www.asus.com/securityadvisory/

    For further help with router setup and an introduction to network security, please visit
    https://www.asus.com/support/FAQ/1008000
    https://www.asus.com/support/FAQ/1039292

    Model name Support site path Firmware version Ready time
    RT-AC1750_B1 https://www.asus.com/supportonly/RT-AC1750_B1/HelpDesk_BIOS/ 384_81351 now
    RT-AC1900 https://www.asus.com/Networking/RT-AC1900/HelpDesk_BIOS/ 384_81351 now
    RT-AC1900P https://www.asus.com/Networking/RT-AC1900P/HelpDesk_BIOS/ 384_81351 now
    RT-AC1900U https://www.asus.com/Networking/RT-AC1900U/HelpDesk_BIOS/ 384_81351 now
    RT-AC86U https://www.asus.com/Networking/RT-AC86U/HelpDesk_BIOS/ 384_81351 now
    RT-AC2900 https://www.asus.com/Networking/RT-AC2900/HelpDesk_BIOS/ 384_81351 now
    RT-AC3200 https://www.asus.com/Networking/RTAC3200/HelpDesk_BIOS/ 382_51641 now
    RT-AC51U https://www.asus.com/Networking/RTAC51U/HelpDesk_BIOS/ 380_8497 now
    RT-AC51U+ https://www.asus.com/Networking/RT-AC51U-plus/HelpDesk_BIOS/ 380_10875 now
    RT-AC52U B1 https://www.asus.com/Networking/RT-AC52U-B1/HelpDesk_Download/ 380_10875 now
    RT-AC66U https://www.asus.com/Networking/RTAC66U/HelpDesk_BIOS/ 382_51634 now
    RT-AC66U B1 https://www.asus.com/Networking/RT-AC66U-B1/HelpDesk_BIOS/ 384_81351 now
    RT-AC66U_WHITE https://www.asus.com/Networking/RTAC66U/HelpDesk_BIOS/ 384_81351 now
    RT-AC67U https://www.asus.com/Networking/AiMesh-AC1900-WiFi-System-RT-AC67U-2-Pack/HelpDesk_BIOS/ 384_81351 now
    RT-AC68P https://www.asus.com/Networking/RTAC68P/HelpDesk_BIOS/ 384_81351 now
    RT-AC68R https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/ 384_81351 now
    RT-AC68RF https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/ 384_81351 now
    RT-AC68RW https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/ 384_81351 now
    RT-AC68U https://www.asus.com/Networking/RTAC68U/HelpDesk_BIOS/ 384_81351 now
    RT-AC68U 2 Pack https://www.asus.com/Networking/AiMesh-AC1900-WiFi-System-RT-AC68U-2-Pack/HelpDesk_BIOS/ 384_81351 now
    RT-AC68U_WHITE https://www.asus.com/us/Networking/RTAC68W/HelpDesk_BIOS/ 384_81351 now
    RT-AC68W https://www.asus.com/us/Networking/RTAC68W/HelpDesk_BIOS/ 384_81351 now
    RT-AC750 https://www.asus.com/supportonly/RT-AC750/HelpDesk_BIOS/ 380_8497 now
    RT-AC87R https://www.asus.com/us/supportonly/RT-AC87R/HelpDesk_BIOS/ 382_51641 now
    RT-AC87U https://www.asus.com/Networking/RTAC87U/HelpDesk_BIOS/ 382_51641 now
    RT-AC87W https://www.asus.com/Networking/RTAC87U/HelpDesk_BIOS/ 382_51641 now
    RT-N66U https://www.asus.com/Networking/RTN66U/HelpDesk_BIOS/ 382_51641 now
    RT-N66U_C1 https://www.asus.com/Networking/RT-N66U-C1/HelpDesk_BIOS/ 384_81351 now
    RT-N14U https://www.asus.com/Networking/RTN14U/HelpDesk_BIOS/ 380_8497 now


    11/15/2019 Important information about ASUSWRT security:
    1. ASUSWRT is the name of the router’s firmware and web interface. It does not refer to any iOS, iPadOS or Android app.
    2. ASUS engineers performed internal tests on ASUSWRT using simulated data and there wasn’t any real user data involved in the process. The test is now over and the server has been taken offline since.
    3. Any reports alleging the application of real user data during the ASUSWRT test are inaccurate and misleading.

    If there are any questions or concerns, please contact ASUS via our Security Advisory reporting system: https://www.asus.com/securityadvisory/

    For further help with router setup and an introduction to network security, please visit https://www.asus.com/support/FAQ/1039292

    10/21/2019 ATK Package Security Update (CVE-2019-19235) for ASUS Notebook PCs

    Vulnerability:CVE-2019-19235

    AsLdrSrv.exe in ASUS ATK Package before V1.0.0061 (for Windows 10 notebook PCs) could lead to unsigned code execution with no additional execution. The user must put an application at a particular path, with a particular file name.

    ASUS has released a new version (1.0.0061) of ATK Package for Win 10 notebook PCs that includes important security updates. ASUS recommends that users with Win 10 notebook PCs running ATK Package version 1.0.0060 and all prior versions update to the latest version. To check the installed version of ATK Package and to download the latest version, visit https://www.asus.com/support/faq/1041545.

    ASUS would like to thank Peleg Hadar from SafeBreach Labs for the assistance with this security update.

    06/14/2019 BIOS Update Announcement for ASUS Notebook PCs

    ASUS has released a BIOS update for notebook PCs to ensure a more secure and convenient computing experience. This update only affects users who currently have a password for their BIOS or hard drive. Concerned users with a password should install the new BIOS update via Windows Update or refer to the instruction from https://www.asus.com/support/FAQ/1040162.
    *ASUS would like to thank Frédéric Vachon from ESET for helping find out this issue.

    05/16/2019 New firmware update for wireless router RT-AC1750_B1/RT-AC1900/RT-AC1900P/RT-AC1900U/RT-AC2900/RT-AC3100/RT-AC3200/RT-AC51U/RT-AC5300/RT-AC56S/RT-AC56U/RT-AC66U/RT-AC66U B1/RT-AC66U_WHITE/RT-AC67U/RT-AC68P/RT-AC68R/RT-AC68RF/RT-AC68RW/RT-AC68U/RT-AC68U 2 Pack/RT-AC68U_WHITE/RT-AC68W/RT-AC750/RT-AC86U/RT-AC87R/RT-AC87U/RT-AC87W/RT-AC88U/RT-N18U/RT-N66U/RT-N66U_C1

    ASUS is releasing a firmware update for selected routers. Our most recent firmware update contains enhanced security protections against unauthorized access, alteration, disclosure of data, malware, phishing and DDoS attacks.

    We strongly encourage you to periodically audit both your equipment and your security procedures, as this will ensure that you will be better protected against unwanted intrusion. As a user of an ASUS router, we advise taking the following actions:

    1. Update your router to the latest firmware. We strongly recommend that you do so as soon as new firmware is released. You will find the latest firmware available for download from the ASUS support page at https://www.asus.com/support/ or the appropriate product page at https://www.asus.com/Networking/. ASUS has provided a link to new firmware for selected routers at the end of this notice.
    2. Set up separate passwords for your wireless network and router-administration page. Use passwords with a length of at least eight characters, including a mix of capital letters, numbers and symbols. Do not use the same password for multiple devices or services.
    3. Enable ASUS AiProtection, if your router supports this feature. Instructions on how to do this can be found in your router’s manual, or on the relevant ASUS support page, at https://www.asus.com/Networking/.


    Please note that if you choose not to install this new firmware version then, to avoid any potential unwanted intrusion, we strongly recommend that you disable remote access from WAN or AiCloud, and reset your router to its default settings.

    If you have already installed the latest firmware version, please disregard this notice.

    Should you have any question or concerns, please contact ASUS via our Security Advisory reporting system: https://www.asus.com/securityadvisory/

    For further help with router setup and an introduction to network security, please visit
    https://www.asus.com/support/FAQ/1008000
    https://www.asus.com/support/FAQ/1039292

    Model name Support site path Firmware version Ready time
    RT-AC1750_B1 https://www.asus.com/supportonly/RT-AC1750_B1/HelpDesk_BIOS/ 384_45717 now
    RT-AC1900 https://www.asus.com/Networking/RT-AC1900/HelpDesk_BIOS/ 384_45717 now
    RT-AC1900P https://www.asus.com/Networking/RT-AC1900P/HelpDesk_BIOS/ 384_45717 now
    RT-AC1900U https://www.asus.com/Networking/RT-AC1900U/HelpDesk_BIOS/ 384_45717 now
    RT-AC2900 https://www.asus.com/Networking/RT-AC2900/HelpDesk_BIOS/ 384_45717 now
    RT-AC3100 https://www.asus.com/Networking/RT-AC3100/HelpDesk_BIOS/ 384_45717 now
    RT-AC3200 https://www.asus.com/Networking/RTAC3200/HelpDesk_BIOS/ 382_51634 now
    RT-AC51U https://www.asus.com/Networking/RTAC51U/HelpDesk_BIOS/ 380_8496 now
    RT-AC5300 https://www.asus.com/Networking/RT-AC5300/HelpDesk_BIOS/ 384_45717 now
    RT-AC56S https://www.asus.com/Networking/RTAC56S/HelpDesk_BIOS/ 382_51634 now
    RT-AC56U https://www.asus.com/Networking/RTAC56U/HelpDesk_BIOS/ 382_51634 now
    RT-AC66U https://www.asus.com/Networking/RTAC66U/HelpDesk_BIOS/ 382_51634 now
    RT-AC66U B1 https://www.asus.com/Networking/RT-AC66U-B1/HelpDesk_BIOS/ 384_45717 now
    RT-AC66U_WHITE https://www.asus.com/Networking/RTAC66U/HelpDesk_BIOS/ 382_51634 now
    RT-AC67U https://www.asus.com/Networking/AiMesh-AC1900-WiFi-System-RT-AC67U-2-Pack/HelpDesk_BIOS/ 384_45717 now
    RT-AC68P https://www.asus.com/Networking/RTAC68P/HelpDesk_BIOS/ 384_45717 now
    RT-AC68R https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/ 384_45717 now
    RT-AC68RF https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/ 384_45717 now
    RT-AC68RW https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/ 384_45717 now
    RT-AC68U https://www.asus.com/Networking/RTAC68U/HelpDesk_BIOS/ 384_45717 now
    RT-AC68U 2 Pack https://www.asus.com/Networking/AiMesh-AC1900-WiFi-System-RT-AC68U-2-Pack/HelpDesk_BIOS/ 384_45717 now
    RT-AC68U_WHITE https://www.asus.com/us/Networking/RTAC68W/HelpDesk_BIOS/ 384_45717 now
    RT-AC68W https://www.asus.com/us/Networking/RTAC68W/HelpDesk_BIOS/ 384_45717 now
    RT-AC750 https://www.asus.com/supportonly/RT-AC750/HelpDesk_BIOS/ 380_8496 now
    RT-AC86U https://www.asus.com/Networking/RT-AC86U/HelpDesk_BIOS/ 384_45717 now
    RT-AC87R https://www.asus.com/us/supportonly/RT-AC87R/HelpDesk_BIOS/ 382_51634 now
    RT-AC87U https://www.asus.com/Networking/RTAC87U/HelpDesk_BIOS/ 382_51634 now
    RT-AC87W https://www.asus.com/Networking/RTAC87U/HelpDesk_BIOS/ 382_51634 now
    RT-AC88U https://www.asus.com/Networking/RT-AC88U/HelpDesk_BIOS/ 384_45717 now
    RT-N18U https://www.asus.com/supportonly/RT-N18U/HelpDesk_BIOS/ 382_51634 now
    RT-N66U https://www.asus.com/Networking/RTN66U/HelpDesk_BIOS/ 382_51636 now
    RT-N66U_C1 https://www.asus.com/Networking/RT-N66U-C1/HelpDesk_BIOS/ 384_45717 now


    05/02/2019 Latest software announcement for ZenFone devices

    ASUS is aware of the vulnerability listed below. We take your security seriously and are working diligently to provide a software update for the affected ZenFone models. Please update your ZenFone to the latest software version as soon as it becomes available. In the meantime, we highly recommended using ASUS Mobile Manager or installing another reliable third-party security app to further secure your devices.

    Possible vulnerability:
    ASUS Contact

    • Private contacts’ user profiles (name, call log, settings) are liable to be accessed, added or deleted.
    • Information of blacklist (blocked phone numbers) is liable to be accessed, added or deleted.

    ASUS Message
    • Private message may be leaked.
    • Any apps can send voice messages without user’s permission.

    ASUS Launcher
    • No permissions required to unlock app

    The following are some security precautions recommended for all users:
    (1) Ensure your operating system and software up to date with the latest version, which you can find on the ASUS website (www.asus.com). Using the search tool located on the top right hand of the ASUS website, search for your device model, and then follow this path: Support > Driver & Utility > Driver & Tools > BIOS & Firmware. Here you can double check if the latest version is the same on your device or you can choose to download it in the event your device did not automatically update.
    (2) Do not download any apps outside of Google Play.
    (3) Uninstall all apps previously downloaded from non-Google Play sources.
    (4) Install ASUS Mobile Manager or a reliable third-party security app to strengthen the security of your devices and applications.


    08/14/2018 Security advisory for OpenVPN server

    Vulnerability: OpenVPN users are able to log in to the web UI with their password

    Solution:
    Please immediately update ASUS router's firmware
    If a firmware update cannot be made the mitigations listed below should be applied, however it’s strongly advised the user updates the firmware at the earliest opportunity:
    • Disable VPN (available on limited models)
    • Change login ID & password again. The password should be at least 8 characters using a mix of letters, numbers and special symbols.

    Affected Products
    Model Firmware(Minimum Recommended Version)
    BRT-AC828 3.0.0.4.380.7526
    GT-AC5300 3.0.0.4.384.21045
    RT-AC5300 3.0.0.4.384.20942
    RT-AC88U 3.0.0.4.384.20942
    RT-AC3200 3.0.0.4.382.50470
    RT-AC3100 3.0.0.4.384.20942
    RT-AC88U 3.0.0.4.382.50702
    RT-AC88R 3.0.0.4.382.50702
    RT-AC86U 3.0.0.4.384.21045
    RT-AC2900 3.0.0.4.384.21045
    RT-AC68U 3.0.0.4.384.20942
    RT-AC68R 3.0.0.4.384.20942
    RT-AC68P 3.0.0.4.384.20942
    RT-AC68W 3.0.0.4.384.20942
    RT-AC68UF 3.0.0.4.384.20942
    RT-AC1900U 3.0.0.4.384.20942
    RT-AC1900 3.0.0.4.384.20942
    RT-AC56U 3.0.0.4.382.50624
    RT-AC56S 3.0.0.4.382.50624
    RT-AC66U_B1 3.0.0.4.384.20942
    RT-AC1750_B1 3.0.0.4.384.20942
    RT-AC66U 3.0.0.4.382.50470
    RT-AC66R 3.0.0.4.382.50470
    RT-AC66W 3.0.0.4.382.50470
    RT-AC55UHP 3.0.0.4.382.50470
    RT-AC55U 3.0.0.4.382.50470
    RT-AC1200G 3.0.0.4.382.50624
    RT-AC1200G+ 3.0.0.4.382.50624
    RT-N800HP 3.0.0.4.382.50470
    RT-N66U_C1 3.0.0.4.384.20942
    RT-N66U 3.0.0.4.382.50470
    RT-N18U 3.0.0.4.382.50470
    Lyra 3.0.0.4.382.11600
    Lyra mini 3.0.0.4.382.11600
    Lyra Trio 3.0.0.4.382.20208
    BlueCave 3.0.1.4.383.19267


    08/07/2018 Latest software announcement for ZenFone/ZenPad devices

    ASUS is aware of the vulnerability listed below. We take your security seriously and are working diligently to provide a software update for the affected ZenFone/ZenPad models. Please update your ZenFone/ZenPad to the latest software version as soon as it becomes available. In the meantime, we highly recommended using ASUS Mobile Manager or installing another reliable third-party security app to further secure your devices.

    Possible vulnerability:
    • A malicious app can get a bug report.
    • A malicious app can take a screenshot (with a screenshot animation).
    • Arbitrary apps can be installed remotely over the internet and can also be uninstalled after being run.
    • Commands can be executed as the system user.

    The following are some security precautions recommended for all users:
    (1) Ensure your operating system and software up to date with the latest version, which you can find on the ASUS website (www.asus.com). Using the search tool located on the top right hand of the ASUS website, search for your device model, and then follow this path: Support > Driver & Utility > Driver & Tools > BIOS & Firmware. Here you can double check if the latest version is the same on your device or you can choose to download it in the event your device did not automatically update.
    (2) Do not download any apps outside of Google Play.
    (3) Uninstall all apps previously downloaded from non-Google Play sources.
    (4) Install ASUS Mobile Manager or a reliable third-party security app to strengthen the security of your devices and applications.

    06/08/2018 Security advisory for VPNFilter malware

    Talos Intelligence recently discovered that VPNFilter is targeting more makes and models than initial release, and the following ASUS routers may be potential targets:
    RT-AC66U
    RT-N10 (EOL)
    RT-N10E (EOL)
    RT-N10U (EOL)
    RT-N56U (EOL)
    RT-N66U

    To help owners of these routers take necessary precautions, we compiled a security checklist:
    (1) Reset the device to factory default: Hold the Reset button in the rear for at least five seconds until the power LED starts blinking.
    (2) Update all devices to the latest firmware.
    (3) Ensure default admin password had been changed to a more secure one.
    (4) Disable Remote Management (disabled by default, can only be enabled via Advanced Settings).
    (5) Enable the URL filter in the Advanced Settings -> Firewall. Set the Filter table type as Black List. Add the "photobucket" and "toknowall" in the URL filter list.

    For any users with the EOL models listed above, we strongly advise upgrading to a router with AiProtection. A wide selection of ASUS and ROG routers offer AiProtection powered by Trend Micro™. Anytime a threat is detected, the connection between your device and the malicious server is blocked before any personal data is compromised. The list of malicious servers is constantly updated by syncing with the Trend Micro cloud database automatically, to ensure your network environment is secure around the clock.

    04/03/2018 Security Vulnerability Notice (CVE-2018-5999, CVE-2018-6000) for ASUS routers

    Vulnerability: CVE-2018-5999, CVE-2018-6000

    ASUS and ROG router products affected are shown in a list below.

    This vulnerability bypasses any user/password changes made by the owner.
    Possible changes to router settings:

    • Port number changes
    • VPN account & password changes
    • DDNS changes
    • The UI language has changed

    Solution:
    Please immediately update your ASUS and ROG router to the latest firmware available.
    If a firmware update cannot be made the mitigations listed below should be applied, however it’s strongly advised the user updates the firmware at the earliest opportunity:

    • Disable SSH / Telnet
    • Disable VPN (available on limited models)
    • Enable AiProtection (available on limited models)
    • Change login ID & password again. The password should be at least 8 characters using a mix of letters, numbers and special symbols.

    Affected Products:
    Model Firmware (Minimum Recommended Version)
    BRT-AC828 3.0.0.4.380.7432
    GT-AC5300 3.0.0.4.384.20287
    RT-AC5300 3.0.0.4.384.20287
    RT-AC88U 3.0.0.4.384.10007
    RT-AC3100 3.0.0.4.384.10007
    RT-AC86U 3.0.0.4.384.10007
    RT-AC2900 3.0.0.4.384.10007
    RT-AC68 series 3.0.0.4.384.10007
    RT-AC1900 series 3.0.0.4.384.10007
    RT-AC66U_B1 3.0.0.4.384.10007
    RT-AC1750_B1 3.0.0.4.384.10007
    RT-AC87 series 3.0.0.4.382.50010
    RT-AC3200 3.0.0.4.382.50010
    RT-AC56U 3.0.0.4.382.50010
    RT-AC55U 3.0.0.4.382.50018
    RT-AC1200 3.0.0.4.380.10446
    RT-N18U 3.0.0.4.382.39935
    RT-AC51U+ 3.0.0.4.380.10446
    RT-AC52U_B1 3.0.0.4.380.10446
    Lyra 3.0.0.4.382.11572
    Lyra mini 3.0.0.4.382.11572
    RT-AC66U 3.0.0.4.380.8228
    RT-N66U 3.0.0.4.380.8228
    RT-N600 3.0.0.4.380.10446
    RT-AC1200GU 3.0.0.4.380.10446
    RT-AC1200G 3.0.0.4.382.50276
    RT-AC1200G+ 3.0.0.4.382.50276
    RT-AC53 3.0.0.4382.10446
    RT-AC750GF 3.0.0.4382.10446
    RT-AC53U 3.0.0.4.380.8228
    RT-N12_D1 3.0.0.4.380.8228
    RT-N12HP_B1 3.0.0.4.380.8228
    RT-AC56S 3.0.0.4.382.50624
    RT-N14U 3.0.0.4.380.8285
    RT-N14UHP 3.0.0.4.380.8287
    RT-AC54U 3.0.0.4.380.8228
    RT-ACRH17 3.0.0.4.382.50243
    RT-AC55UHP 3.0.0.4.382.50276
    RT-N300 3.0.0.4.380.8228
    RT-AC1200HP 3.0.0.4.380.8228
    RT-AC51U 3.0.0.4.380.8228
    RT-AC750 3.0.0.4.380.8228
    RT-AC52U 3.0.0.4.380.8241
    RT-AC58U 3.0.0.4.380.8228
    RT-ACRH13 3.0.0.4.380.8228
    RT-AC1300UHP 3.0.0.4.380.8228
    RT-N11P_B1 3.0.0.4.380.10410
    RT-N300_B1 3.0.0.4.380.10410
    RT-N12 VP_B1 3.0.0.4.380.10410
    RT-N12+ B1 3.0.0.4.380.10410
    RT-N12+ PRO 3.0.0.4.380.10410
    RT-N12E C1 3.0.0.4.380.10410


    12/30/2017 New firmware available for Wireless Router GT-AC5300/ RT-AC5300/ RT-AC88U/ RT-AC3100/ RT-AC87U/ RT-AC87R/ RT-AC3200/ RT-AC86U/ RT-AC68 series/ RT-AC55U/ RT-N18U/
    10/31/2017 Update on security advisory for the vulnerability of WPA2 protocol

    ASUS is working closely with chipset suppliers to resolve the vulnerability in the WPA2 security protocol, which affects some but not all ASUS products (check the list below). KRACK can exploit the vulnerability only under certain conditions highlighted in the previous update. Your network configuration is more secure when under these conditions:

    (1) Routers and gateways working in their default mode (Router Mode) and AP Mode.
    (2) Range extenders working in AP Mode.
    (3) When Powerline adapters and switch products are used.

    ASUS is working actively towards a solution, and will continue to post software updates. Find out more: https://www.asus.com/support/

    Full list of routers unaffected by KRACK while in default mode:
    GT-AC5300
    RT-AC1200
    RT-AC1200G
    RT-AC1200G Plus
    RT-AC1200HP
    RT-AC1300HP
    RT-AC1900
    RT-AC1900P
    RT-AC3100
    RT-AC3200
    RT-AC51U
    RT-AC52U
    RT-AC53
    RT-AC5300
    RT-AC53U
    RT-AC54U
    RT-AC55U
    RT-AC55UHP
    RT-AC56S
    RT-AC56U
    RT-AC58U
    RT-AC66U
    RT-AC66U B1
    RT-AC66W
    RT-AC68P
    RT-AC68UF
    RT-AC68W
    RT-AC86U
    RT-AC87U
    RT-AC88U
    RT-ACRH17
    RT-ACRH13
    RT-N10P V3
    RT-N11P B1
    RT-N12 D1
    RT-N12 VP B1
    RT-N12+
    RT-N12+ B1
    RT-N12E C1
    RT-N12E_B1
    RT-N12HP B1
    RT-N14U
    RT-N14UHP
    RT-N16
    RT-N18U
    RT-N300 B1
    RT-N56U
    RT-N56U B1
    RT-N65U
    RT-N66U
    RT-N66W
    BRT-AC828
    DSL-AC87VG
    DSL-AC52U
    DSL-AC55U
    DSL-AC56U
    DSL-AC68R
    DSL-AC68U
    DSL-N10_C1
    DSL-N12E_C1
    DSL-N12HP
    DSL-N12U
    DSL-N12U B1
    DSL-N12U D1
    DSL-N12U_C1
    DSL-N14U
    DSL-N14U B1
    DSL-N16
    DSL-N16U
    DSL-N17U
    DSL-N55U D1
    DSL-N55U_C1
    4G-AC68U
    RT-AC65U
    RT-AC85U

    10/18/2017 Security advisory for the vulnerabilities of WPA2 protocol

    ASUS is aware of the recent WPA2 vulnerability issue. We take your security and privacy seriously and are currently working towards a full solution as quickly as possible. In the meantime, we want to help clarify the severity of the potential threat, and let our valued customers know the appropriate steps to take in order to avoid or lessen the threat of being compromised.

    Your devices are only vulnerable if an attacker is in physical proximity to your wireless network and is able to gain access to it. This exploit cannot steal your banking information, passwords, or other data on a secured connection that utilizes proper end-to-end encryption. However, an attacker could capture and read this information on an unsecured connection via an exploited WiFi network. Depending on the network configuration, it is also possible for the attacker to redirect network traffic, send invalid data to devices or even inject malware into the network.

    We are feverishly working with chipset suppliers to resolve this vulnerability and will release patched firmware for affected routers in the near future. Before this patched firmware is released, here are a few cautions all users should take:

    (1) Avoid public Wi-Fi and Hotspots until the routers and your devices are updated. Use cellular network connections if possible.
    (2) Only connect to secured services that you trust or have been verified. Web pages that use HTTPS or another secure connection will include HTTPS in the URL. If the connection is secured using TLS 1.2 your activities with that service is safe for now.
    (3) Keep your operating system and antivirus software up-to-date. Microsoft recently updated Windows to fix this exploit on their latest operating systems. Google and Apple are following suit shortly.
    (4) When in doubt, be safe and use your cellular network or a wired connection (Ethernet) to access the internet. This exploit only affects 802.11 traffic between a Wi-Fi router and a connected device on an exploited WiFi connection.

    04/26/2017 New firmware available for Wireless Router RT-AC88U/ Wireless Router RT-AC66U B1
    04/24/2017 New firmware available for Wireless Router RT-AC5300/ Wireless Router RT-AC3100
    04/14/2017 New firmware available for Wireless Router RT-AC53
    03/31/2017 New firmware available for Wireless Router RT-AC87U/ RT-AC87R/ RT-AC3200/ RT-AC68U/ RT-AC68R/ RT-AC68W/ RT-AC68P/ RT-AC1900P/ RT-AC66U/ RT-AC66R/ RT-AC1750/ RT-AC56U/ RT-AC56R/ RT-N66U/ RT-N66R/ RT-N66W/ RT-AC53U/ RT-AC51U/ RT-AC750/ RT-N300/ RT-N11P/ RT-N12+/ RT-N12+ Pro/ RT-N12E B1/
    03/24/2017 New software available for Wireless Adapter PCE-AC56
    12/23/2016 New firmware available for Wireless Router RT-AC5300 / RT-AC88U / RT-AC3100 / RT-AC3200 / RT-AC87U / RT-AC87R / RT-AC66U / RT-AC66W / RT-AC1750 / RT-AC55UHP / RT-AC55U / RT-AC52U / RT-N56U / RT-N12 D1
    12/13/2016 New firmware available for Wireless Router RT-AC68U / RT-AC68R / RT-AC68W / RT-AC68UF / RT-AC68P / RT-AC1900P / RT-AC1900 / RT-AC66U_B1
    10/29/2016 New firmware available for Repeater RP-N12 / RP-N14 / RP-N53 / RP-AC52/ RP-AC56/ Media Bridge EA-N66/ EA-N66R

    10/17/2016 New ATK driver available for Notebook K53SV
    09/10/2016 New firmware available for Wireless Router RT-AC66U / RT-AC66R / RT-AC66W / RT-AC1750

    Hall of fame

    We would like to thank the following people have made responsible disclosures to us. They were very first reporters to notified qualifying vulnerabilities which consented to be fixed by ASUSTek Computer Inc. Thank you and congratulations for demonstrating your technical skill, security knowledge, and responsible behavior.

    2020 ∇
    April 2020:
    • Jinwei Chen (Bangcle Security)
    • SecurityMate (@securitymate)
    • Steffin Stanly
    • Wai Yan Aung
    March 2020:
    • Hein HtetAung
    • Lütfü Mert Ceylan
    • Wai Yan Aung
    • Yusuf Kocadaş
    February 2020:
    • Ishan Anand
    • João Varelas
    • مصطفى محمود
    • Romon Wafa
    • Wai Yan Aung
    January 2020:
    • Joby Y Daniel
    • Pritam Mukherjee
    • Raphael Karger
    • Wai Yan Aung
    2019 ∇
    December 2019:
    • Sonam Kumar
    • pr0v3rbs of KAIST SysSec
    • Martin Rakhmanov
    November 2019:
    • Mustafa Diaa (@c0braBaghdad1)
    • Hasnain Shaukat
    • Wai Yan Aung
    October 2019:
    • Matt Langlois
    • Pankaj Kumar Thakur (NEPAL)
    • Rafid Hasan Khan
    • S Naveen Kumar, Ernst & Young (Chennai), Security Analyst
    • Satish Khadka
    • Sourajeet Majumder
    • Wai Yan Aung
    • Peleg Hadar from SafeBreach Labs
    September 2019:
    • Ahmad Halabi
    • Moaied Nagi Hassan(moonlight)
    • Mustafa Diaa (@c0braBaghdad1 )
    • Sourajeet Majumder
    • Wai Yan Aung
    August 2019:
    • Pankaj Kumar Thakur (Nepal)
    • Mustafa Diaa (@c0braBaghdad1 )
    • Wai Yan Aung
    • Athanasios Tserpelis of Telspace Systems
    July 2019:
    • Mohammed Ahmad
    • Wai Yan Aung
    June 2019:
    • Naufal Septiadi
    • Sattar Jabbar
    • S1mba Lu
    May 2019:
    • Leron Gray
    • Mark Wemhöner
    • Matt Cundari
    • Abdualrhman Muzamil ( RespondTeam.com )
    • Harsh Joshi
    • Khun Myat
    • Mustafa Diaa (@c0braBaghdad1 )
    • Nyi Htet Aung
    • Tao SAUVAGE
    • Zika Ds
    April 2019:
    • Aamir Usman Khan
    • Khun Myat
    • Ko Ko Naing
    • Mustafa Diaa ( @c0braBaghdad1 )
    • Nyi Htet Aung
    • Pranshu Tiwari
    • Tarun Mahour
    • Wai Yan Aung
    • Tao Sauvage, IOActive, Senior Security Consultant
    March 2019:
    • Priyanshu Gupta
    • Wai Yan Aung
    • Talib Osmani
    • Javier Aguinaga
    • Chaoyi Lu
    • Resecurity International
    February 2019:
    • Salman Sajid Khan
    • Tijo Davis
    • Roy Solberg
    • CodeBreaker of STARLabs
    • Ronnie
    January 2019:
    • Mustafa Kemal Can
    • Jesus Arturo Espinoza Soto
    • Wai Yan Aung
    • JAIMEivanM mendoza ribera
    • Suraj Gourkar
    • Sabeer Bijapur
    2018 ∇
    December 2018:
    • Hamza Mandil
    • bharat
    • Mustafa Khan
    • AbdelRhman Adel
    • Mohammed Adam
    • Thejus Krishnan
    November 2018:
    • Numan ÖZDEMİR
    • Hazem Osama
    • Pyae Phyoe Thu
    • Hein Thant Zin
    • Ram Makwana
    • Wai Yan Aung
    October 2018:
    • Himanshu Rahi
    • Ashik S N
    • Dhiyaneshwaran
    • Wai Yan Aung
    • Pratik Raut
    • CYBERNETIV DIGITAL
    • Duda, Przemyslaw
    September 2018:
    • Ruikai Liu
    • Fakhri Zulkifli
    • Matthew Cundari
    • Deepanshu Tyagi
    • Mayank
    • Baiqing Lyu (吕柏庆)
    August 2018:
    • El-Staifi
    • Wai Yan Aung
    • Bill Ben Haim
    • Sumit Sahoo
    • Lakshay Gupta
    • tty0
    July 2018:
    • Rick Ramgattie
    • Nishant Saurav
    • Mohammed Adel
    • Wai Yan Aung
    • Pethuraj M
    June 2018:
    • Lawrence Amer
    • Alban Cenaj
    • Wai Yan Aung
    May 2018:
    • Yeasir Arafat
    • Anil Tom
    • Sara Badran
    April 2018:
    • Yonghui Han of Fortinet's FortiGuard Labs
    • Dmitriy Alekseev
    • Fish Getachew
    • Nathu Nandwani
    • Nicodemo Gawronski & Ana Maria Popescu @amiutza
    • Diego Juarez from Core Security Technologies for Elevation of Privilege vulnerability in Asus Aura Sync.
    • Mohamed A. Baset of Seekurity.com SAS de C.V.
    March 2018:
    • Emad Abou Shanab
    • Konduru Jashwanth
    • Nikhil Srivastava
    • Dan Nino I. Fabro.
    • Kunal Bahl
    February 2018:
    • HaoTian Xiang
    • Niv Levi
    • Chris Wood
    • Vasim Shaikh (India)
    • Wen Bin Kong
    • Florian Kunushevci
    • Pritesh Mistry
    • Ismail Tasdelen
    January 2018:
    • Dipak Prajapati
    • Vasim Shaikh (India)
    • Akaash M. Sharma
    • Kushal Sharma
    • Adesh Nandkishor Kolte
    • Chirag Gupta
    • Osanda Malith Jayathissa (@OsandaMalith)
    • Chacko K Abraham
    • Suvadip Kar
    • Ankit Singh Nikhil Sahoo and Ipsita Subhadarshan Sahoo
    • Yassine Nafiai
    • Guy Arazi
    2017 ∇
    December 2017:
    • Blazej Adamczyk
    • Joaquim Espinhara
    • Beyond Security’s SecuriTeam Secure Disclosure program
    • David Maciejak of Fortinet's FortiGuard Labs
    November 2017:
    • Ketankumar Godhani
    • Ankit Singh
    • Junaid Farhan
    October 2017:
    • Daniel Diez
    • Sankalpa Nirmana
    • Vyshnav Vizz
    September 2017:
    • Samet Şahin
    • Ranjeet Jaiswal
    August 2017:
    • Yoko
    • Sreedeep Ck Alavil
    April 2017:
    • Cool Alfaiz
    • Manav Infosec
    • Mohammad Abdullah
    March 2017:
    • Cool Alfaiz
    January 2017:
    • CDL
    2016 ∇
    December 2016:
    • Kishan Kumar
    October 2016:
    • Yunus Yildirim
    • Muhammad Hammad
    • Chris
    September 2016:
    • Steave Afters
    • Jhack

    Contacting Us

    If you have any inquiries, questions, comments or complaints about the security advisory page, Please feel free to contact security@asus.com.