ASUS Product Security Advisory

We take every care to ensure that ASUS products are secure in order to protect the privacy of our valued customers. We constantly strive to improve our safeguards for security and personal information in accordance with all applicable laws and regulations, and we welcome all reports from our customers about product-related security or privacy issues. Any information you supply to ASUS will only be used to help resolve the security vulnerabilities or issues you have reported. This process may include contacting you for further relevant information.

How to report a security vulnerability or issue to ASUS

We welcome all reports about security-related issues incidents and privacy concerns, and we invite you to contact us about such matters via our dedicated website at https://www.asus.com/securityadvisory/. In order for us to deal swiftly with your concerns, please make sure filling in the following information to the website.

  1. Your full name, and a means of contacting you. This can be an email address, a phone number or any other preferred way we can use to get in touch with you. If you provide a phone number, please include the full country code, area code and extension number (if applicable).
  2. Full and detailed information about the issue you wish to report. This should include the following information, as applicable:
    1. The name of the ASUS service(s) or system(s) that your concern relates to.
    2. The product type, product name and model number of the affected hardware products.
    3. The name, description and version number of any affected ASUS software products.
    4. A full and detailed description of the problem or issue, along with any background information that you believe is relevant, and any other pertinent information that may help us reproduce and/or resolve the issue.

Responsible reporting guidelines

ASUS appreciates all contributions from customers and the wider ASUS community that help to improve the security of our products and services. However, we kindly request that you act responsibly and bear in mind the following when investigating or reporting any issues:

  1. Do not attempt to access or modify any ASUS services, systems, products or software without authorization.
  2. Do not disclose, or modify, destroy or misuse any data you may discover.
  3. All information given to or received from any party relating to the reported issues must remain completely confidential.

What happens next?

Once we have resolved the reported issue(s), we will provide a suitable solution to all affected customers. We will treat this with the utmost priority and make the solution available as soon as it practical to do so.

ASUS will also maintain a list of the latest software updates, along with descriptions of the issues that have been fixed. Although we will notify customers wherever possible, we also recommend that customers visit this page regularly to make sure they are aware of the latest updates.

Latest security updates

10/21/2024 AMD Security update

ASUS will release BIOS for AMD Security Updates, please see the detail schedule as below. Please go to ASUS server website to download the latest BIOS, ASUS will keep update release schedule accordingly.

Should you have any questions or concerns, please contact ASUS via our Security Advisory reporting system:
https://www.asus.com/securityadvisory/


Model Motherboard AMD Security Notice Release Date
RS700A-E11 series KMPP-D32 Milan PI 1.0.0.D wk46 '24
RS720A-E11 series KMPP-D32 Milan PI 1.0.0.D wk46 '24
RS700A-E11 series KMPP-D32-R Rome PI 1.0.0.J wk48 '24
RS720A-E11 series KMPP-D32-R Rome PI 1.0.0.J wk48 '24
RS500A-E11 series KMPA-U16 Milan PI 1.0.0.D wk1 '25
RS520A-E11 series KMPA-U16 Milan PI 1.0.0.D wk1 '25
RS500A-E10 series KRPA-U16-M Milan PI 1.0.0.D wk1 '25
RS700A-E12 series K14PP-D24 Genoa PI 1.0.0.D wk2 '25
RS720A-E12 series K14PP-D24 Genoa PI 1.0.0.D wk2 '25
RS500A-E11 series KMPA-U16-R Rome PI 1.0.0.J wk2 '25
RS520A-E11 series KMPA-U16-R Rome PI 1.0.0.J wk2 '25
RS500A-E10 series KRPA-U16 Rome PI 1.0.0.J wk2 '25
ESC8000A-E12 K14PG-D24 Genoa PI 1.0.0.D wk3 '25
ESC8000A-E11 KMPG-D32 Milan PI 1.0.0.D wk3 '25
ESC4000A-E11 KMPG-U8 Milan PI 1.0.0.D wk3 '25
ESC N4A-E11 KMPN-U16 Milan PI 1.0.0.D wk3 '25
ESC4000A-E10 KRPG-U8-M Milan PI 1.0.0.D wk3 '25
- S14NA-U12 Siena PI 1.0.0.D wk3 '25
RS720QA-E12 K14PH-D24 Genoa PI 1.0.0.D wk4 '25
ESC8000A-E11 KMPG-D32-R Rome PI 1.0.0.J wk4 '25
ESC4000A-E11 KMPG-U8-R Rome PI 1.0.0.J wk4 '25
ESC4000A-E10 KRPG-U8 Rome PI 1.0.0.J wk4 '25
RS520A-E12 series K14PA-U24 Genoa PI 1.0.0.D wk5 '25
- K14PA-U12 Genoa PI 1.0.0.D wk5 '25
RS500A-E12 series K14PA-U24 Genoa PI 1.0.0.D wk6 '25
ESC4000A-E12 K14PG-U12 Genoa PI 1.0.0.D wk6 '25
N/A K14PN-D24 Genoa PI 1.0.0.D wk6 '25
RS700A-E9 series KNPP-D32 Naples PI 1.0.0.M wk7 '25
RS720A-E9 series KNPP-D32 Naples PI 1.0.0.M wk7 '25
RS700A-E9 V2 series KNPP-D32-R Rome PI 1.0.0.J wk8 '25
RS720A-E9 V2 series KNPP-D32-R Rome PI 1.0.0.J wk8 '25
RS500A-E9 series KNPA-U16 Naples PI 1.0.0.M wk9 '25
RS500A-E9 series KNPA-U16-R Rome PI 1.0.0.J wk10 '25


09/06/2024 Guidance on enhancing router security

We recommend regularly checking your equipment and security measures for enhanced safety. If you use an ASUS router, follow these steps:

• Update your router with the newest firmware. We encourage you to do this when new firmware becomes available. You can find the newest firmware on the ASUS support page at
https://www.asus.com/support/ or the relevant product page at
https://www.asus.com/Networking/. ASUS has provided a link to new firmware for some routers at the end of this notice.
• Use different passwords for your wireless network and router-administration page. Use passwords that have at least 10 characters, with a mix of capital letters, numbers and symbols. Do not use the same password for more than one device or service.

 

Please ensure that your login and WiFi passwords are secure if you cannot upgrade the firmware promptly. "


For further help with router setup and an introduction to network security, please visit
https://www.asus.com/support/FAQ/1008000
https://www.asus.com/support/FAQ/1039292

 

Please update the firmware for the models listed to the version specified in the table.

Model Firmware version Firmware download link
DSL-AC68U

3.0.0.4.386_50120

https://www.asus.com/networking-iot-servers/modem-routers/all-series/dslac68u/helpdesk_bios?model2Name=DSLAC68U
DSL-AX82U

3.0.0.4.388_24894

https://www.asus.com/supportonly/dsl-ax82u/helpdesk_bios?model2Name=DSL-AX82U

GT-AC2900

3.0.0.4.386_51529

https://www.asus.com/supportonly/rog%20rapture%20gt-ac2900/helpdesk_bios/

GT-AC5300

3.0.0.4.386_51529

https://www.asus.com/supportonly/gt-ac5300/helpdesk_bios/

GT-AX11000

3.0.0.4.388_24328

https://www.asus.com/supportonly/gt-ax11000/helpdesk_download/

GT-AX6000

3.0.0.6.102_34793

https://www.asus.com/supportonly/gt-ax6000/helpdesk_bios/

GT-AXE16000

3.0.0.4.388_24329

https://www.asus.com/supportonly/rog%20rapture%20gt-axe16000/helpdesk_bios/

RT-AC1750_B1

3.0.0.4.386_51685

https://www.asus.com/supportonly/rt-ac1750_b1/helpdesk_bios/

RT-AC1900

3.0.0.4.386_51685

https://www.asus.com/supportonly/rt-ac1900/helpdesk_bios/

RT-AC3100

3.0.0.4.386_48263

https://www.asus.com/supportonly/rt-ac3100/helpdesk_bios?model2Name=RT-AC3100

RT-AC5300

3.0.0.4.386_48377

https://www.asus.com/supportonly/rt-ac5300/helpdesk_bios?model2Name=RT-AC5300

RT-AC66U_B1

3.0.0.4.386_51685

https://www.asus.com/supportonly/rt-ac66u-b1/helpdesk_bios?model2Name=RT-AC66U-B1

RT-AC67U

3.0.0.4.386_51685

https://www.asus.com/supportonly/rt-ac67u/helpdesk_bios?model2Name=RT-AC67U

RT-AC68P

3.0.0.4.386_51685

https://www.asus.com/supportonly/rt-ac68p/helpdesk_bios?model2Name=RT-AC68P

RT-AC68R

3.0.0.4.386_51685

https://www.asus.com/supportonly/rt-ac68r/helpdesk_bios?model2Name=RT-AC68R

RT-AC68U

3.0.0.4.386_51685

https://www.asus.com/supportonly/rt-ac68u/helpdesk_bios?model2Name=RT-AC68U

RT-AC68W

3.0.0.4.386_51685

https://www.asus.com/supportonly/rt-ac68w/helpdesk_bios?model2Name=RT-AC68W

RT-AC86U

3.0.0.4.386_51925

https://www.asus.com/supportonly/rt-ac86u/helpdesk_bios?model2Name=RT-AC86U

RT-AC88U

3.0.0.4.386_48263

https://www.asus.com/supportonly/rt-ac88u/helpdesk_bios?model2Name=RT-AC88U

RT-AX3000

3.0.0.4.388_24762

https://www.asus.com/supportonly/rt-ax3000/helpdesk_bios?model2Name=RT-AX3000

RT-AX56U

3.0.0.4.386_51679

https://www.asus.com/supportonly/rt-ax56u/helpdesk_bios?model2Name=RT-AX56u

RT-AX58U

3.0.0.4.388_24762

https://www.asus.com/supportonly/rt-ax58u/helpdesk_bios?model2Name=RT-AX58u

RT-AX68U

3.0.0.4.388_24646

https://www.asus.com/supportonly/rt-ax68u/helpdesk_bios?model2Name=RT-AX68u

RT-AX82U

3.0.0.4.388_24963

https://www.asus.com/supportonly/rt-ax82u/helpdesk_bios?model2Name=RT-AX82u

RT-AX86S

3.0.0.4.388_24243

https://www.asus.com/supportonly/rt-ax86s/helpdesk_bios?model2Name=RT-AX86S

RT-AX86U

3.0.0.4.388_24243

https://www.asus.com/supportonly/rt-ax86u/helpdesk_bios?model2Name=RT-AX86-Series-RT-AX86U-RT-AX86S

RT-AX88U

3.0.0.4.388_24209

https://www.asus.com/supportonly/rt-ax88u/helpdesk_bios?model2Name=RT-AX88U

RT-AX89X

3.0.0.4.388_32407

https://www.asus.com/us/supportonly/rt-ax89x/helpdesk_bios?model2Name=RT-AX89X

RT-AX92U

3.0.0.4.388_23630

https://www.asus.com/us/supportonly/rt-ax92u/helpdesk_bios?model2Name=RT-AX92U

TUF-AX3000

3.0.0.4.388_22525

https://www.asus.com/us/supportonly/tuf-ax3000/helpdesk_bios?model2Name=TUF-AX3000

TUF-AX4200

3.0.0.4.388_33481

https://www.asus.com/us/supportonly/tuf-ax4200/helpdesk_bios?model2Name=TUF-AX4200

TUF-AX5400

3.0.0.4.388_24121

https://www.asus.com/us/supportonly/tuf-ax5400/helpdesk_bios?model2Name=TUF-AX5400

ZenWiFi XD6

3.0.0.4.388_23773

https://www.asus.com/wa/supportonly/zenwifi%20xd6/helpdesk_bios/

ZenWiFi XT8

3.0.0.4.388_24621

https://www.asus.com/supportonly/asus%20zenwifi%20ax%20(xt8)/helpdesk_bios/

4G-AC53U

3.0.0.4.384_81975

https://www.asus.com/us/supportonly/4g-ac53u/helpdesk_knowledge?model2Name=4G-AC53U

If your router is listed below, follow these steps to secure it:

  • Reset the router to default settings.
  • Disable remote access services such as WAN access, AiDisk, AiCloud, FTP, Download Master, VPN, Port Forwarding.

Applicable Routers: Blue Cave, RT-AC1200, RT-AC1200HP, RT-AC1300GPLUS, RT-AC1300UHP, RT-AC1750, RT-AC3200, RT-AC51U, RT-AC51UPLUS, RT-AC52U, RT-AC52U_B1, RT-AC54U, RT-AC55U, RT-AC55UHP, RT-AC56R, RT-AC56U, RT-AC58U, RT-AC66R, RT-AC66U, RT-AC66W, RT-AC750, RT-AC85U, RT-AC87R, RT-AC87U, RT-ACRH13, RT-N14U, RT-N14UHP, RT-N16, RT-N18U, RT-N66R, RT-N66U, RT-N66W.

06/14/2024 Download master security update notice for CVE-2024-31159, CVE-2024-31160, CVE-2024-31161, CVE-2024-31162 and CVE-2024-31163

ASUS has updated the Download Master with security enhancements.


To increase your safety, check your equipment and security procedures often. For ASUS router users, do these step:

 • If you turned on the Download master, login the web GUI and go to USB application --> Download Master and click the update to get the latest version of Download master (3.1.0.114)

Please update the Download Master as soon as possible. If you cannot do so, ensure that your login and WiFi passwords are secure. Use passwords with more than 10 characters, including a mix of capital letters, numbers, and symbols, to protect your devices better. Avoid passwords with sequential numbers or letters, such as 1234567890, abcdefghij, or qwertyuiop.


For further help with router setup and an introduction to network security, please visit
https://www.asus.com/support/FAQ/1008000
https://www.asus.com/support/FAQ/1039292



06/14/2024 XT8, XT8_V2, RT-AX88U, RT-AX58U, RT-AX57, RT-AC86U, RT-AC68U security update notice for CVE-2024-3079 and CVE-2024-3080

ASUS has released a new firmware update for the XT8, XT8_V2, RT-AX88U, RT-AX58U, RT-AX57, RT-AC86U, RT-AC68U

 

We advise you to check your equipment and security procedures regularly, as this will make you safer. As a user of an ASUS router, we recommend doing the following steps: 

• Update your router with the newest firmware. We encourage you to do this when new firmware becomes available. You can find the newest firmware on the ASUS support page at
https://www.asus.com/support/ or the relevant product page at
https://www.asus.com/Networking/. ASUS has provided a link to new firmware for some routers at the end of this notice.
• Use different passwords for your wireless network and router-administration page. Use passwords that have at least 10 characters, with a mix of capital letters, numbers and symbols. Do not use the same password for more than one device or service.

 

If you are not able to update the firmware quickly, please make sure that both your login and WiFi passwords are strong. It is recommended (1) disable any services that can be reached from the internet, such as remote access from WAN, port forwarding, DDNS, VPN server, DMZ, port trigger. (2) passwords have more than 10 characters with a variety of capitalized letters, numbers, and special characters to increase the security level of your devices. Do not use passwords with consecutive numbers or letters, such as 1234567890, abcdefghij, or qwertyuiop."


For further help with router setup and an introduction to network security, please visit
https://www.asus.com/support/FAQ/1008000
https://www.asus.com/support/FAQ/1039292



Model name

Support Site link

XT8 and XT8_V2

https://www.asus.com/uk/supportonly/asus%20zenwifi%20ax%20(xt8)/helpdesk_bios/

RT-AX88U

https://www.asus.com/supportonly/RT-AX88U/helpdesk_bios/

RT-AX58U

https://www.asus.com/supportonly/RT-AX58U/helpdesk_bios/

RT-AX57

https://www.asus.com/networking-iot-servers/wifi-routers/asus-wifi-routers/rt-ax57/helpdesk_bios

RT-AC86U

https://www.asus.com/supportonly/RT-AC86U/helpdesk_bios/

RT-AC68U

https://www.asus.com/supportonly/RT-AC68U/helpdesk_bios/

05/29/2024 XT8, XT8_V2, RT-AX88U, RT-AX86U, RT-AX58U, RT-AX57, RT-AX55, RT-AC86U, RT-AC86U, RT-AC68U security update notice for CVE-2024-0401

ASUS has released firmware update for the XT8, XT8_V2, RT-AX88U, RT-AX86U, RT-AX58U, RT-AX57, RT-AX55, RT-AC86U, RT-AC86U, RT-AC68U to fixed CVE-2024-0401  

We advise you to check your equipment and security procedures regularly, as this will make you safer. As a user of an ASUS router, we recommend doing the following steps: 

• Update your router with the newest firmware. We encourage you to do this when new firmware becomes available. You can find the newest firmware on the ASUS support page at
https://www.asus.com/support/ or the relevant product page at
https://www.asus.com/Networking/. ASUS has provided a link to new firmware for some routers at the end of this notice.
• Use different passwords for your wireless network and router-administration page. Use passwords that have at least 10 characters, with a mix of capital letters, numbers and symbols. Do not use the same password for more than one device or service.

Please ensure that your login and WiFi passwords are secure if you cannot upgrade the firmware promptly. It is advisable that you AVOID uploading the OVPN file to the OpenVPN client until the firmware is updated.

For further help with router setup and an introduction to network security, please visit
https://www.asus.com/support/FAQ/1008000
https://www.asus.com/support/FAQ/1039292



Model name

Support Site link

XT8 and XT8_V2

https://www.asus.com/uk/supportonly/asus%20zenwifi%20ax%20(xt8)/helpdesk_bios/

RT-AX88U

https://www.asus.com/supportonly/RT-AX88U/helpdesk_bios/

RT-AX86U

https://www.asus.com/networking-iot-servers/wifi-6/all-series/rt-ax86u/helpdesk_bios?model2Name=RT-AX86-Series-RT-AX86U-RT-AX86S

RT-AX58U

https://www.asus.com/supportonly/RT-AX58U/helpdesk_bios/

RT-AX57

https://www.asus.com/networking-iot-servers/wifi-routers/asus-wifi-routers/rt-ax57/helpdesk_bios

RT-AX55

https://www.asus.com/supportonly/RT-AX55/helpdesk_bios/

RT-AC86U

https://www.asus.com/supportonly/RT-AC86U/helpdesk_bios/

RT-AC68U

https://www.asus.com/supportonly/RT-AC68U/helpdesk_bios/

04/12/2024 EBM68, EBR63 and RT-AX57 Go security update notice for CVE-2024-1655

ASUS has released a new firmware update for the EBM68, EBR63 and RT-AX57 Go.


We advise you to check your equipment and security procedures regularly, as this will make you safer. As a user of an ASUS router, we recommend doing the following steps:
• Update your router with the newest firmware. We encourage you to do this when new firmware becomes available. You can find the newest firmware on the ASUS support page at
https://www.asus.com/support/ or the relevant product page at
https://www.asus.com/Networking/. ASUS has provided a link to new firmware for some routers at the end of this notice.
• Use different passwords for your wireless network and router-administration page. Use passwords that have at least 10 characters, with a mix of capital letters, numbers and symbols. Do not use the same password for more than one device or service.


If you are not able to update the firmware quickly, please make sure that both your login and WiFi passwords are strong. It is recommended (1) disable any services that can be reached from the internet, such as remote access from WAN, port forwarding, DDNS, VPN server, DMZ, port trigger. (2) passwords have more than 10 characters with a variety of capitalized letters, numbers, and special characters to increase the security level of your devices. Do not use passwords with consecutive numbers or letters, such as 1234567890, abcdefghij, or qwertyuiop."


For further help with router setup and an introduction to network security, please visit
https://www.asus.com/support/FAQ/1008000
https://www.asus.com/support/FAQ/1039292



Model name

Support Site link

EBM68

https://www.asus.com/supportonly/ebm68/helpdesk_bios/

EBR63

https://www.asus.com/supportonly/ebr63/helpdesk_bios/

RT-AX57 Go

https://www.asus.com/supportonly/RT-AX57-Go/helpdesk_bios/

01/22/2024 DSL-N12U_C1, DSL-N12U_D1, DSL-N14U, DSL-N14U_B1, DSL-N16, DSL-N17U, DSL-N55U_C1, DSL-N55U_D1, DSL-N66U, DSL-AC51, DSL-AC750, DSL-AC52U, DSL-AC55U, DSL-AC56U security update notice for code execution vulnerability

ASUS has released a new firmware update for the DSL-N12U_C1, DSL-N12U_D1, DSL-N14U, DSL-N14U_B1, DSL-N16, DSL-N17U, DSL-N55U_C1, DSL-N55U_D1, DSL-N66U, DSL-AC51, DSL-AC750, DSL-AC52U, DSL-AC55U, DSL-AC56U

We encourage you to periodically audit both your equipment and your security procedures, as this will ensure that you will be better protected. As a user of an ASUS router, we advise taking the following actions:
Update your router to the latest firmware. We strongly recommend that you do so as soon as new firmware is released (refer to https://www.asus.com/support/FAQ/1008000#a2 and manually update the firmware in the WebGUI).
You will find the latest firmware available for download from the ASUS support page
at https://www.asus.com/support/. or the appropriate product page.
Please refer to

If you opt not to update the firmware, it is advisable to disable any services that are accessible from the internet, such as remote access from WAN, port forwarding, DDNS, VPN server, DMZ, port trigger.


For further help with router setup and an introduction to network security, please visit
https://www.asus.com/support/FAQ/1039292.


Model name

Support Site link

DSL-N12U_C1

https://www.asus.com/supportonly/dsln12u_c1/helpdesk_bios/

DSL-N12U_D1

https://www.asus.com/supportonly/dsln12u_d1/helpdesk_bios/

DSL-N14U

https://www.asus.com/supportonly/dsl-n14u/helpdesk_bios/

DSL-N14U_B1

https://www.asus.com/supportonly/dsl-n14u-b1/helpdesk_bios?model2Name=DSL-N14U-B1

DSL-N16

https://www.asus.com/networking-iot-servers/modem-routers/all-series/dsl-n16/helpdesk_bios?model2Name=DSL-N16

DSL-N17U

https://www.asus.com/supportonly/dsl-n17u/helpdesk_bios/

DSL-N55U_C1

https://www.asus.com/supportonly/dsln55u_c1/helpdesk_bios/

DSL-N55U_D1

https://www.asus.com/supportonly/dsln55u_d1/helpdesk_bios/

DSL-N66U

https://www.asus.com/supportonly/dsl-n66u/helpdesk_bios/

DSL-AC51/DSL-AC750

https://www.asus.com/networking-iot-servers/modem-routers/all-series/dsl-ac51/helpdesk_bios?model2Name=DSL-AC51


https://www.asus.com/networking-iot-servers/modem-routers/all-series/dsl-ac750/helpdesk_bios?model2Name=DSL-AC750

DSL-AC52U

https://www.asus.com/supportonly/dsl-ac52u/helpdesk_bios?model2Name=DSL-AC52U

DSL-AC55U

https://www.asus.com/networking-iot-servers/modem-routers/all-series/dsl-ac55u/helpdesk_bios?model2Name=DSL-AC55U

DSL-AC56U

https://www.asus.com/supportonly/dsl-ac56u/helpdesk_bios?model2Name=DSL-AC56U

01/03/2024 Security Update for Armoury Crate App

Vulnerability:
CVE No#: CVE-2023-5716

ASUS has released a Software Update for Armoury Crate, a system management software. This update includes important security updates and ASUS strongly recommends that users update their Armoury Crate installation to the latest version. The latest Software Update can be accessed by opening Armoury Crate, then navigating to the “Settings” > “Update Center” tab, and selecting the “ASUS framework service v4.1.0.8” update.

11/03/2023 RT-AX55 security update notice for CVE-2023-41345, CVE-2023-41346, CVE-2023-41347, CVE-2023-41348

ASUS has released new firmware update for the RT-AX55 for CVE-2023-41345, CVE-2023-41346, CVE-2023-41347, CVE-2023-41348


We encourage you to periodically audit both your equipment and your security procedures, as this will ensure that you will be better protected. As a user of an ASUS router, we advise taking the following actions:
1. Update your router to the latest firmware. We strongly recommend that you do so as soon as new firmware is released. You will find the latest firmware available for download from the ASUS support page at https://www.asus.com/support/ or the appropriate product page at https://www.asus.com/Networking/. ASUS has provided a link to new firmware for selected routers at the end of this notice.
2. Set up separate passwords for your wireless network and router-administration page. Use passwords with a length of at least eight characters, including a mix of capital letters, numbers and symbols. Do not use the same password for multiple devices or services.
3. Enable ASUS AiProtection, if your router supports this feature. Instructions on how to do this can be found in your router’s manual, or on the relevant ASUS support page, at https://www.asus.com/Networking/.


If you are unable to update the firmware promptly, please ensure that both your login and WiFi passwords are strong. It is recommended (1) disable any services that are accessible from the internet, such as remote access from WAN, port forwarding, DDNS, VPN server, DMZ, port trigger. (2) passwords have more than 8 characters mixed with capitalized letters, numbers, and special characters to increase the security level of your devices. Do not use passwords with consecutive numbers or letters, such as 12345678, abcdefgh, or qwertyuiop."


For further help with router setup and an introduction to network security, please visit
https://www.asus.com/support/FAQ/1008000
https://www.asus.com/support/FAQ/1039292


Model name

Firmware download path

RT-AX55

https://www.asus.com/networking-iot-servers/wifi-6/all-series/rt-ax55/helpdesk_bios/?model2Name=RT-AX55

09/12/2023 RT-AX55, RT-AX56U_V2 and RT-AC86U security update notice for CVE-2023-39238, CVE-2023-39239, CVE-2023-39240

ASUS has released new firmware update for the RT-AX55, RT-AX56U_V2 and RT-AC86U for CVE-2023-39238, CVE-2023-39239, CVE-2023-39240


We encourage you to periodically audit both your equipment and your security procedures, as this will ensure that you will be better protected. As a user of an ASUS router, we advise taking the following actions:
1. Update your router to the latest firmware. We strongly recommend that you do so as soon as new firmware is released. You will find the latest firmware available for download from the ASUS support page at https://www.asus.com/support/ or the appropriate product page at https://www.asus.com/Networking/. ASUS has provided a link to new firmware for selected routers at the end of this notice.
2. Set up separate passwords for your wireless network and router-administration page. Use passwords with a length of at least eight characters, including a mix of capital letters, numbers and symbols. Do not use the same password for multiple devices or services.
3. Enable ASUS AiProtection, if your router supports this feature. Instructions on how to do this can be found in your router’s manual, or on the relevant ASUS support page, at https://www.asus.com/Networking/.


If you are unable to update the firmware promptly, please ensure that both your login and WiFi passwords are strong. It is recommended (1) disable any services that are accessible from the internet, such as remote access from WAN, port forwarding, DDNS, VPN server, DMZ, port trigger. (2) passwords have more than 8 characters mixed with capitalized letters, numbers, and special characters to increase the security level of your devices. Do not use passwords with consecutive numbers or letters, such as 12345678, abcdefgh, or qwertyuiop."


For further help with router setup and an introduction to network security, please visit
https://www.asus.com/support/FAQ/1008000
https://www.asus.com/support/FAQ/1039292


Model name

Firmware download path

RT-AX55

https://www.asus.com/networking-iot-servers/wifi-6/all-series/rt-ax55/helpdesk_bios/?model2Name=RT-AX55

RT-AX56U V2

https://www.asus.com.cn/networking-iot-servers/wifi-routers/all-series/rt-ax56u-v2/helpdesk_bios/?model2Name=RT-AX56U-V2

RT-AC86U

https://www.asus.com/supportonly/rt-ac86u/helpdesk_bios/?model2Name=RT-AC86U

07/25/2023 Strengthening DDNS Security for RT-AX1800U, RT-AX3000, RT-AX3000 v2, RT-AX86U, TUF-AX3000 and TUF-AX5400

The RT-AX1800U, RT-AX3000, RT-AX3000 v2, RT-AX86U, TUF-AX3000 and TUF-AX5400 router models now allow binding DDNS to a user's account to mitigate the risk of Man-in-the-Middle (MITM) attacks. We advise taking the following actions:


1. If you're not managing your router with the ASUS Router App, we recommend installing it. The app can be found by searching for "ASUS Router App" in the iOS App Store or Google Play. For more information about the app, please refer to this link: https://www.asus.com/content/asus-router-app/

2. Update your router to the latest firmware using the ASUS Router App. Here's how you can do it: https://www.asus.com/support/FAQ/1045788/

3. Connect your device to your account: Detailed instructions on how to do this are provided here: https://www.asus.com/support/FAQ/1048185


Please note, if you choose not to connect your device to your account, we strongly recommend disabling services accessible from the WAN side to avoid potential unwanted intrusions. These services include remote access from WAN, port forwarding, DDNS, VPN server, DMZ, port trigger.


For further help with router setup and an introduction to network security, please visit
https://www.asus.com/support/FAQ/1008000
https://www.asus.com/support/FAQ/1039292


Model name

Firmware download path

RT-AX1800U

https://www.asus.com/networking-iot-servers/wifi-routers/asus-wifi-routers/rt-ax1800u/helpdesk_bios/?model2Name=RT-AX1800U

RT-AX3000

https://www.asus.com/networking-iot-servers/wifi-routers/asus-wifi-routers/rt-ax3000/helpdesk_bios/?model2Name=RT-AX3000

RT-AX3000 v2

https://www.asus.com/networking-iot-servers/wifi-routers/asus-wifi-routers/rt-ax3000/helpdesk_bios/?model2Name=RT-AX3000

RT-AX86U

https://www.asus.com/networking-iot-servers/wifi-6/all-series/rt-ax86u/helpdesk_bios/?model2Name=RT-AX86-Series-RT-AX86U-RT-AX86S

TUF-AX3000

https://www.asus.com/supportonly/tuf-ax3000/helpdesk_bios/

TUF-AX5400

https://www.asus.com/networking-iot-servers/wifi-routers/asus-gaming-routers/tuf-gaming-ax5400/helpdesk_bios/?model2Name=TUF-Gaming-AX5400

06/27/2023 4G-N16 security update notice

ASUS has released a new firmware update for the 4G-N16 to address a vulnerability concerning the WiFi Protected Setup (WPS) PIN brute force attack.


To update your firmware, please click on the firmware check button located within the web GUI. Alternatively, you can manually download the firmware update by visiting the following link: https://www.asus.com/supportonly/4g-n16/helpdesk_bios/?model2Name=4G-N16


Please be aware that if you decide against installing this new firmware version, we strongly advise disabling WPS for your own security.


For further help with router setup and an introduction to network security, please visit
https://www.asus.com/support/FAQ/1008000
https://www.asus.com/support/FAQ/1039292

06/19/2023 New firmware with accumulate security updates for GT6/GT-AXE16000/GT-AX11000 PRO/GT-AXE11000/GT-AX6000/GT-AX11000/GS-AX5400/GS-AX3000/XT9/XT8/XT8 V2/RT-AX86U PRO/RT-AX86U/RT-AX86S/RT-AX82U/RT-AX58U/RT-AX3000/TUF-AX6000/TUF-AX5400

We strongly encourage you to periodically audit both your equipment and your security procedures, as this will ensure that you will be better protected. As a user of an ASUS router, we advise taking the following actions:

  1. Update your router to the latest firmware. We strongly recommend that you do so as soon as new firmware is released. You will find the latest firmware available for download from the ASUS support page at https://www.asus.com/support/or the appropriate product page at https://www.asus.com/Networking/. ASUS has provided a link to new firmware for selected routers at the end of this notice.
  2. Set up separate passwords for your wireless network and router-administration page. Use passwords with a length of at least eight characters, including a mix of capital letters, numbers and symbols. Do not use the same password for multiple devices or services.
  3. Enable ASUS AiProtection, if your router supports this feature. Instructions on how to do this can be found in your router’s manual, or on the relevant ASUS support page, at https://www.asus.com/Networking/.

 

Please note, if you choose not to install this new firmware version, we strongly recommend disabling services accessible from the WAN side to avoid potential unwanted intrusions. These services include remote access from WAN, port forwarding, DDNS, VPN server, DMZ, port trigger.

For further help with router setup and an introduction to network security, please visit
https://www.asus.com/support/FAQ/1008000
https://www.asus.com/support/FAQ/1039292

 

The new firmware incorporates the following security fixes.

  1. Fixed CVE-2023-28702, CVE-2023-28703, CVE-2023-31195, CVE-2022-46871, CVE-2022-38105, CVE-2022-35401, CVE-2018-1160, CVE-2022-38393, CVE-2022-26376
  2. Fixed DoS vulnerabilities in firewall configuration pages.
  3. Fixed DoS vulnerabilities in httpd.
  4. Fixed information disclosure vulnerability.
  5. Fixed null pointer dereference vulnerabilities.
  6. Fixed the cfg server vulnerability.
  7. Fixed the vulnerability in the logmessage function.
  8. Fixed Client DOM Stored XSS
  9. Fixed HTTP response splitting vulnerability
  10. Fixed status page HTML vulnerability.
  11. Fixed HTTP response splitting vulnerability.
  12. Fixed Samba related vulerabilities.
  13. Fixed Open redirect vulnerability.
  14. Fixed token authentication security issues.
  15. Fixed security issues on the status page.
  16. Enabled and supported ECDSA certificates for Let's Encrypt.
  17. Enhanced protection for credentials.
  18. Enhanced protection for OTA firmware updates.

 

 

Model name

Firmware download path

GT6

https://rog.asus.com/networking/rog-rapture-gt6-model/helpdesk_bios/

GT-AXE16000

https://rog.asus.com/networking/rog-rapture-gt-axe16000-model/helpdesk_bios/

GT-AXE11000 PRO

https://rog.asus.com/networking/rog-rapture-gt-ax11000-pro-model/helpdesk_bios/

GT-AXE11000

https://rog.asus.com/networking/rog-rapture-gt-axe11000-model/helpdesk_bios/

GT-AX6000

https://rog.asus.com/networking/rog-rapture-gt-ax6000-model/helpdesk_bios/

GT-AX11000

https://rog.asus.com/networking/rog-rapture-gt-ax11000-model/helpdesk_bios/

GS-AX5400

https://rog.asus.com/networking/rog-strix-gs-ax5400-model/helpdesk_bios/

GS-AX3000

https://rog.asus.com/networking/rog-strix-gs-ax3000-model/helpdesk/

ZenWiFi XT9

https://www.asus.com/networking-iot-servers/whole-home-mesh-wifi-system/zenwifi-wifi-systems/asus-zenwifi-xt9/helpdesk_bios/?model2Name=ASUS-ZenWiFi-XT9

ZenWiFi XT8

https://www.asus.com/networking-iot-servers/whole-home-mesh-wifi-system/zenwifi-wifi-systems/asus-zenwifi-ax-xt8/helpdesk_bios/?model2Name=ASUS-ZenWiFi-AX-XT8

ZenWiFi XT8_V2

https://www.asus.com/networking-iot-servers/whole-home-mesh-wifi-system/zenwifi-wifi-systems/asus-zenwifi-ax-xt8/helpdesk_bios/?model2Name=ASUS-ZenWiFi-AX-XT8

RT-AX86U PRO

https://www.asus.com/networking-iot-servers/wifi-routers/asus-gaming-routers/rt-ax86u-pro/helpdesk_bios/?model2Name=RT-AX86U-Pro

RT-AX86U

https://www.asus.com/networking-iot-servers/wifi-6/all-series/rt-ax86u/helpdesk_bios/?model2Name=RT-AX86-Series-RT-AX86U-RT-AX86S

RT-AX86S

https://www.asus.com/networking-iot-servers/wifi-6/all-series/rt-ax86u/helpdesk_bios/?model2Name=RT-AX86-Series-RT-AX86U-RT-AX86S

RT-AX82U

https://www.asus.com/networking-iot-servers/wifi-routers/asus-gaming-routers/rt-ax82u/helpdesk_bios/?model2Name=RT-AX82U

RT-AX58U

https://www.asus.com/networking-iot-servers/wifi-routers/asus-wifi-routers/rt-ax58u/helpdesk_bios/?model2Name=RT-AX58U

RT-AX3000

https://www.asus.com/us/networking-iot-servers/wifi-routers/asus-wifi-routers/rt-ax3000/helpdesk_bios/?model2Name=RT-AX3000

TUF-AX6000

https://www.asus.com/networking-iot-servers/wifi-routers/asus-gaming-routers/tuf-gaming-ax6000/helpdesk_bios/?model2Name=TUF-Gaming-AX6000

TUF-AX5400

https://www.asus.com/networking-iot-servers/wifi-routers/asus-gaming-routers/tuf-gaming-ax5400/helpdesk_bios/?model2Name=TUF-Gaming-AX5400

05/19/2023 [Wireless Router] Interruption in Router Product Connectivity and Urgent Mitigation Measures

During routine security maintenance, our technical team discovered an error in the configuration of our server settings file, which could potentially cause an interruption in network connectivity on part of the routers.


Our technical team has urgently addressed the server issue and impacted routers should return to normal operation. If your device was affected, we recommend the following:


1. Manually reboot your router.
2. If rebooting does not resolve the issue, please save the settings file, perform a hard reset (factory default), and then re-upload the settings file (follow the directions in the https://www.asus.com/support/FAQ/1050464 )
3. If you cannot access the user interface to save settings or perform a reset, you can press the RESET button for about 5-10 seconds until the power LED indicator on the router starts to blink, which means the reset is completed. https://www.asus.com/support/FAQ/1000925/#m2


If there are any further developments around this issue, we will immediately update our users.


We deeply apologize for any inconvenience this incident may have caused and are committed to preventing such an incident from happening again.


For any further inquiries about your ASUS router, please contact our customer service for support.
[Official Support | ASUS Global|https://www.asus.com/support/contact/Serviceflow/support]

01/13/2023 ASMB9-iKVM and ASMB10-iKVM Security Update Notice

Vulnerability: CVE No#: CVE-2022-40259、CVE-2022-40242、CVE-2022-2827


ASUS has released Software Updates for ASMB9-iKVM and ASMB10-iKVM, a remote system management software. This update includes important security updates related to Redfish API, Default credentials for sysadmin user, and ASUS strongly recommends that users update ASMB9-iKVM and ASMB10-iKVM to the latest version. Please go to ASUS server website to download the latest firmware, ASUS will keep update release schedule accordingly.


Should you have any questions or concerns, please contact ASUS via our Security Advisory reporting system:
https://www.asus.com/securityadvisory/


Release version and schedule
ASMB9-iKVM

Model Motherboard Updated Version Release Week

RS700-E9-RS4

Z11PP-D24

2.2.9

WK5’2023

RS700-E9-RS12

2.2.9

WK5’2023

RS720-E9-RS12-E

2.2.4

WK5’2023

RS720-E9-RS24-E

2.2.4

WK5’2023

RS720-E9-RS8

2.2.4

WK5’2023

ESC4000 G4

Z11PG-D16

2.2.23

WK5’2023

ESC4000 G4X

2.2.23

WK5’2023

ESC4000 G4S

2.2.23

WK5’2023

ESC8000

Z11PG-D24

2.2.6

WK6’2023

ESC8000 G4-10G

2.2.6

WK6’2023

ESC4000A-E10

KRPG-U8

2.3.5

WK6’2023

RS700A-E9-RS12V2

KNPP-D32-R

2.2.4

WK6’2023

RS700A-E9-RS4V2

2.2.4

WK6’2023

RS720A-E9-RS24V2

2.2.4

WK6’2023

RS720A-E9-RS12V2

2.2.4

WK6’2023

KRPA-U16

KRPA-U16

2.2.3

WK6’2023

RS500A-E10-PS4

2.2.3

WK6’2023

RS500A-E10-RS4

2.2.3

WK6’2023

RS500A-E10-RS12U

2.2.3

WK6’2023


ASMB10-iKVM

Model Motherboard Updated Version Release Week

RS700A-E11-RS12U

KMPP-D32

1.2.20

WK2’2023

RS700A-E11-RS4U

1.2.20

WK2’2023

RS720A-E11-RS24U

1.2.20

WK2’2023

RS720A-E11-RS12

1.2.20

WK2’2023

RS520A-E11-RS24U

KMPA-U16

1.2.20

WK2’2023

RS520A-E11-RS12U

1.2.20

WK2’2023

RS500A-E11-RS12U

1.2.20

WK2’2023

RS500A-E11-RS4U

1.2.20

WK2’2023

ESC8000A-E11

KMPG-D32

1.2.20

WK2’2023

ESC4000A-E11

KMPG-U8

1.2.20

WK2’2023

ESC4000A-E10

KRPG-U8

2.3.5

WK2’2023

RS720Q-E10-RS8U

Z12PH-D16

1.2.20

WK2’2023

RS720-E10-RS12

Z12PP-D32

1.2.20

WK3’2023

RS720-E10-RS12E

1.2.20

WK3’2023

RS720-E10-RS24U

1.2.20

WK3’2023

RS700-E10-RS4U

1.2.20

WK3’2023

RS700-E10-RS12U

1.2.20

WK3’2023

ESC4000-E10

Z12PG-D16

1.2.20

WK3’2023

ESC4000-E10S

1.2.20

WK3’2023

RS300-E11-RS4

P12R-M/SYS

1.1.3

WK3’2023

P12R-I

P12R-I

1.12

WK3’2023

P12R-E

P12R-E

1.13

WK3’2023

P12R-E/10G-2T

P12R-E/10G-2T

1.13

WK3’2023

11/02/2022 ASUS routers are not affected by OpenSSL CVE-2022-3786 and CVE-2022-3602

Refer to OpenSSL posts https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/
the bugs were introduced as part of punycode decoding functionality (currently only used for processing email address name constraints in X.509 certificates). This code was first introduced in OpenSSL 3.0.0. OpenSSL 1.0.2, 1.1.1 and other earlier versions are not affected.


ASUS routers do not use OpenSSL 3.0.0 and not affected.


Should you have any questions or concerns, please contact ASUS via our Security Advisory reporting system:
https://www.asus.com/securityadvisory/
For further help with router setup and an introduction to network security, please visit
https://www.asus.com/support/FAQ/1008000
https://www.asus.com/support/FAQ/1039292

10/19/2022 Security advisory for RT-N12E CVE-2020-23648

Vulnerability: CVE No#: CVE-2020-23648


This vulnerability affects the RT-N12E which is in default status.
The RT-N12E is not affected after setting the username and password in the initial setup process.
The other models with 3.0.0.4.xxxx firmware are not affected by this vulnerability.
Should you have any questions or concerns, please contact ASUS via our Security Advisory reporting system:
https://www.asus.com/securityadvisory/
For further help with router setup and an introduction to network security, please visit
https://www.asus.com/support/FAQ/1008000
https://www.asus.com/support/FAQ/1039292

10/11/2022 Security update for Aura Sync App

ASUS has released a new version (1.07.84_v2) of Aura Sync app which includes some vulnerability fixes.
For users with Aura Sync 1.07.79 version or any prior versions, ASUS recommends they update to the latest version.

09/16/2022 Elevation of Privilege by ASUS System Control Interface V3 services of MyASUS

Vulnerability: CVE-2022-36438、CVE-2022-36439
ASUS has released the new ASUS System Control Interface V3 version 3.1.5.0, which includes important security updates for ASUS personal computers, including desktops, laptops and All-in-One PCs. The latest update contains fixes for the CVE-2022-36438、CVE-2022-36439 vulnerability.


ASUS recommends that all ASUS personal computer users running ASUS System Control Interface V3 version 3.1.4.0, or any prior versions, should update to the latest version 3.1.5.0. To learn how to update to the latest version, visit
https://www.asus.com/support/FAQ/1035376/, or update the driver via Windows update:
https://www.asus.com/support/FAQ/1035492

09/15/2022 Security Update for Armoury Crate App

Vulnerability: CVE No#: CVE-2022-38699
ASUS has released a Software Update for Armoury Crate, a system management software. This update includes important security updates, and ASUS strongly recommends that users update their Armoury Crate installation to the latest version. The latest Software Update can be received by opening Armoury Crate, in the “Settings” > “Update Center” tab, and click “Check for Updates”. Click“Update” on ARMOURY CRATE if the new version is available.

06/30/2022 Security advisory for ZuoRAT

ZuoRAT is a MIPS file however RT-AC5300, RT-AC68U, RT-AC68P, RT-AC1900P, RT-AC1900 are ARM–based routers. MIPS program cannot run on ARM–based processor.
ASUS strongly recommends that users update the firmware to the latest version which included more security measures to block malware.
To check the latest version, please visit the relevant ASUS support website. Download links are in the below table.


Model name Firmware download path

RT-AC5300

https://www.asus.com/supportonly/RT-AC5300/HelpDesk_BIOS/

RT-AC68U

https://www.asus.com/supportonly/RT-AC68U/HelpDesk_BIOS/

RT-AC68P

https://www.asus.com/supportonly/RT-AC68P/HelpDesk_BIOS/

RT-AC1900P

https://www.asus.com/supportonly/RT-AC1900P/HelpDesk_BIOS/

RT-AC1900

https://www.asus.com/supportonly/RT-AC1900/HelpDesk_BIOS/


To help owners of these routers take necessary precautions, we compiled a security checklist:
(1) Reset the device to factory default: Login into the web GUI (http://router.asus.com) , go to Administration → Restore/Save/Upload Setting, click the “Initialize all the setting and clear all the data log”, and then click Restore button
(2) Update all devices to the latest firmware.
(3) Ensure default admin password had been changed to a more secure one.
(4) Disable Remote Management (disabled by default, can only be enabled via Advanced Settings).

04/27/2022 ASUS RT-AX88U firmware update

Vulnerability: CVE-2022-26673, CVE-2022-26674


ASUS has released the firmware for RT-AX88U and fixed CVE-2022-26673 and CVE-2022-26674 vulnerability.
ASUS recommends that users update to the 3.0.0.4.386.46065 or newer version.
If you have already installed the latest firmware version, please disregard this notice.
Should you have any question or concerns, please contact ASUS via our Security Advisory reporting system: https://www.asus.com/securityadvisory/
For further help with router setup and an introduction to network security, please visit
https://www.asus.com/support/FAQ/1008000
https://www.asus.com/support/FAQ/1039292

04/26/2022 ScreenXpert Security Update for ASUS laptops

ASUS has released a new version (2.2.13.0) of ScreenXpert for ASUS laptops that includes important security updates and vulnerability fixes.
For users with an ASUS laptop running ScreenXpert 2.2.12.0 or any prior versions, ASUS recommends they update to the latest version. To check your currently installed version of ScreenXpert and to download the latest version, please visit: https://www.microsoft.com/store/apps/9N5RFFGFHHP6

04/01/2022 Security Advisory update for Cyclops Blink

ASUS has released new firmware that included more security measures to block malware.

ASUS strongly recommends that users update the firmware to the latest version.


To check the latest version, please visit the relevant ASUS support website. Download links are in the below table.


Model name Firmware download path

GT-AC5300

https://www.asus.com/supportonly/GT-AC5300/HelpDesk_BIOS/

GT-AC2900

https://rog.asus.com/networking/rog-rapture-gt-ac2900-model/helpdesk_bios

RT-AC5300

https://www.asus.com/supportonly/RT-AC5300/HelpDesk_BIOS/

RT-AC88U

https://www.asus.com/supportonly/RT-AC88U/HelpDesk_BIOS/

RT-AC3100

https://www.asus.com/supportonly/RT-AC3100/HelpDesk_BIOS/

RT-AC86U

https://www.asus.com/supportonly/RT-AC86U/HelpDesk_BIOS/

RT-AC68U

https://www.asus.com/supportonly/RT-AC68U/HelpDesk_BIOS/

RT-AC68R

https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/

RT-AC68W

https://www.asus.com/supportonly/RT-AC68W/HelpDesk_BIOS/

RT-AC68P

https://www.asus.com/supportonly/RT-AC68P/HelpDesk_BIOS/

RT-AC66U_B1

https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AC66U-B1/

RT-AC3200

https://www.asus.com/supportonly/RT-AC3200/HelpDesk_BIOS/

RT-AC2900

https://www.asus.com/supportonly/RT-AC2900/HelpDesk_BIOS/

RT-AC1900P

https://www.asus.com/supportonly/RT-AC1900P/HelpDesk_BIOS/

RT-AC1900

https://www.asus.com/supportonly/RT-AC1900/HelpDesk_BIOS/

If you have already installed the latest firmware version, please disregard this notice.

Should you have any question or concerns, please contact ASUS via our Security Advisory reporting system: https://www.asus.com/securityadvisory/

For further help with router setup and an introduction to network security, please visit

https://www.asus.com/support/FAQ/1008000

https://www.asus.com/support/FAQ/1039292

03/29/2022 Software update for the ASUS Control Center

Vulnerability:
CVE No#: CVE-2022-26668, CVE-2022-26669


ASUS has released a Software update for the ASUS Control Center – An integrated management software. This update includes important security updates, and ASUS strongly recommends that users of ASUS Control Center upgrade the Software to the latest version. Please find the latest Software Update in the following link https://dlcdnet.asus.com/pub/ASUS/server/ACC/ASUS_Control_Center_V1.4.3.2.zip

03/25/2022 Security Advisory for Cyclops Blink

ASUS is investigating and working for a remediation for Cyclops Blink and will continue to post software update.


To help owners of these routers take necessary precautions, we compiled a security checklist:
(1) Reset the device to factory default: Login into the web GUI(http://router.asus.com) , go to Administration → Restore/Save/Upload Setting, click the “Initialize all the setting and clear all the data log”, and then click Restore button”
(2) Update all devices to the latest firmware.
(3) Ensure default admin password had been changed to a more secure one.
(4) Disable Remote Management (disabled by default, can only be enabled via Advanced Settings).


Affected products


GT-AC5300 firmware = 3.0.0.4.384.xxxx or earlier version
GT-AC2900 firmware = 3.0.0.4.384.xxxx or earlier version
RT-AC5300 firmware = 3.0.0.4.384.xxxx or earlier version
RT-AC88U firmware = 3.0.0.4.384.xxxx or earlier version
RT-AC3100 firmware = 3.0.0.4.384.xxxx or earlier version
RT-AC86U firmware = 3.0.0.4.384.xxxx or earlier version.
RT-AC68U, AC68R, AC68W, AC68P firmware = 3.0.0.4.384.xxxx or earlier version
RT-AC66U_B1 firmware = 3.0.0.4.384.xxxx or earlier version
RT-AC3200. We advise users to reset the router and disable remote connection. New firmware will be released soon.
RT-AC2900 firmware = 3.0.0.4.384.xxxx or earlier version.
RT-AC1900P, RT-AC1900P = 3.0.0.4.384.xxxx or earlier version.
RT-AC87U (EOL)
RT-AC66U (EOL)
RT-AC56U (EOL)


Please note that if you choose not to install this new firmware version then, to avoid any potential unwanted intrusion, we strongly recommend that you disable remote access from WAN and reset your router to its default settings.


If you have already installed the latest firmware version, please disregard this notice.


Should you have any question or concerns, please contact ASUS via our Security Advisory reporting system:
https://www.asus.com/securityadvisory


For further help with router setup and an introduction to network security, please visit
https://www.asus.com/support/FAQ/1008000
https://www.asus.com/support/FAQ/1039292

03/10/2022 Elevation of Privilege by ASUS System Diagnosis service of MyASUS

Vulnerability: CVE-2022-22814


ASUS has released the new MyASUS version 3.1.2.0 for ASUS laptops and desktop PCs, and this version contains important security updates, including fixes for the CVE-2022-22814 vulnerability.


For all ASUS laptops or desktop PCs running MyASUS version 3.1.1.0 or any prior versions, ASUS recommends that users update to the latest version 3.1.2.0. To learn how to update to the latest version, please visit https://www.asus.com/support/FAQ/1039711 , or download the app via the Microsoft store: https://www.microsoft.com/store/apps/9N7R5S6B0ZZH


ASUS would like to thank Denis Faiustov and Ruslan Sayfiev from Ierae Security Inc. for their assistance with this security update.

01/14/2022 ASUS Mini PC BIOS Security Update
12/17/2021 ASUS Response to Apache Log4j Remote Code Execution Vulnerability

Executive Summary:

A recently published vulnerability in Apache Log4j (CVE-2021-44228) has the potential to cause remote code execution on servers used by Java-based application for their logging functionality.
For more information, please review the published CVE-2021-44228


Affected Products & Services:

The following table summarizes the ASUS products’ & services’ status as it relates to this vulnerability, and any actions needed to be performed by customers based on information available at this time:

Product Line Sub-Product Status Action Required to Apply Mitigation

Wireless Routers

All Models

Not Affected

No action required by customers

Industrial PC

All Models

Not Affected

No action required by customers

AIOT

AI Solutions

Not Affected

No action required by customers

All Models

Not Affected

No action required by customers

Smart Phones

All Models

Not Affected

No action required by customers

Commercial NB, PC

All Models

Not Affected

No action required by customers

Multimedia

All Models

Not Affected

No action required by customers

Optical Drives

All Models

Not Affected

No action required by customers

Personal NB, PC

All Models

Not Affected

No action required by customers

Displays

All Models

Not Affected

No action required by customers

Gaming devices (ROG)

All Models

Not Affected

No action required by customers

Mother Boards

All Models

Not Affected

No action required by customers

Servers

All Models

Not Affected

No action required by customers

IRobot

All Models

Not Affected

No action required by customers

Accessories

All Models

Not Affected

No action required by customers

ASUS Intelligent Cloud Services

All Web services

Not Affected

No action required by customers

Open Cloud Infra Software

ASUS Cloud Infra

Not Affected

No action required by customers

Customer support services

All Web services

Not Affected

No action required by customers


PLEASE FREQUENTLY CHECK FOR INFORMATION ABOUT THE LATEST UPDATES AND ADVISORIES FROM ASUS REGARDING YOUR EQUIPMENT AND SOFTWARE.
THE INFORMATION PROVIDED IN THIS ADVISORY IS PROVIDED ON AN “AS IS” BASIS WITHOUT ANY WARRANTY OR GUARANTEE OF ANY KIND.
ASUS RESERVES THE RIGHT TO CHANGE OR UPDATE THIS ADVISORY AT ANY TIME WITHOUT NOTICE.

12/06/2021 ASUS routers security updates (2021 Q4)

Vulnerability:


CVE-2016-2148, CVE-2016-6301, CVE-2018- 1000517, CVE-2020-8169, CVE-2019-5481, CVE-2019-5482, CVE-2018-1000120, CVE-2018- 1000300, CVE-2018-16839 CVE-2018-19052, CVE-2020-14305, CVE-2020-25643, CVE-2019-19052 CVE-2020-27827, CVE-2017-6519, CVE-2021-30004, CVE-2019-16275 CVE-2020-11810, CVE-2020-15078, CVE-2021-30004, CVE-2021-27803, CVE-2019-11555, CVE-2019-9499, CVE-2019-9498, CVE-2019-9497, CVE-2019-9496, CVE-2019-9495, CVE-2019-9494, CVE-2017-13086, CVE-2017-13084, CVE-2017-13082, CVE-2016-4476, CVE-2015-8041, CVE-2021-41435, CVE-2021-41436


ASUS has released firmware updates for the multiple routers. This update includes important security updates, and ASUS strongly recommends that users update the firmware to the latest version.


To check the latest version, please visit the relevant ASUS support website. A full list of download links is provided in the below table.

Model name Firmware download path

GT-AXE11000

https://rog.asus.com/networking/rog-rapture-gt-axe11000-model/helpdesk_bios

GT-AX11000

https://rog.asus.com/networking/rog-rapture-gt-ax11000-model/helpdesk_bios

GT-AC2900

https://rog.asus.com/networking/rog-rapture-gt-ac2900-model/helpdesk_bios

TUF Gaming AX3000

https://www.asus.com/my/Networking-IoT-Servers/WiFi-6/All-series/TUF-Gaming-AX3000/HelpDesk_BIOS/

RT-AX92U

https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX92U/HelpDesk_BIOS/

RT-AX88U

https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX88U/HelpDesk_BIOS/

RT-AX86U

https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX86U/HelpDesk_BIOS/

RT-AX82U

https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX82U/HelpDesk_BIOS/

RT-AX68U

https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX68U/HelpDesk_BIOS/

RT-AX58U

https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX58U/HelpDesk_BIOS/

RT-AX56U

https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX56U/HelpDesk_BIOS/

RT-AX55

https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX55/HelpDesk_BIOS/

RT-AC88U

https://www.asus.com/supportonly/RT-AC88U/HelpDesk_download/

RT-AC3100

https://www.asus.com/supportonly/RT-AC3100/HelpDesk_download/

RT-AC86U

https://www.asus.com/supportonly/RT-AC86U/HelpDesk_download/

RT-AC2900

https://www.asus.com/supportonly/RT-AC2900/HelpDesk_download/

RT-AC1750_B1

https://www.asus.com/supportonly/RT-AC1750_B1/HelpDesk_download/

RT-AC1900

https://www.asus.com/supportonly/RT-AC1900/HelpDesk_download/

RT-AC1900P

https://www.asus.com/supportonly/RT-AC1900P/HelpDesk_download/

RT-AC1900U

https://www.asus.com/supportonly/RT-AC1900U/HelpDesk_download/

RT-AC66U B1

https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AC66U-B1/HelpDesk_Download/

RT-AC68P

https://www.asus.com/supportonly/RT-AC68P/HelpDesk_download/

RT-AC68R

https://www.asus.com/supportonly/RT-AC68R/HelpDesk_download/

RT-AC68RF

https://www.asus.com/supportonly/RT-AC68RF/HelpDesk_download/

RT-AC68RW

https://www.asus.com/supportonly/RT-AC68RW/HelpDesk_download/

RT-AC68U

https://www.asus.com/supportonly/RT-AC68U/HelpDesk_download/

RT-AC68U_WHITE

https://www.asus.com/supportonly/RT-AC68W/HelpDesk_download/

RT-AC68W

https://www.asus.com/supportonly/RT-AC68W/HelpDesk_download/

ZenWiFi AX

https://www.asus.com/supportonly/ASUS%20ZenWiFi%20AX%20(XT8)/HelpDesk_Download/

ZenWiFi AC

https://www.asus.com/supportonly/ASUS%20ZenWiFi%20AC%20(CT8)/HelpDesk_download/

ZenWiFi AC Mini

https://www.asus.com/supportonly/ZenWiFi%20AC%20Mini%20(CD6)/HelpDesk_download/

ZenWiFi Mini AX

https://www.asus.com/supportonly/ZenWiFi%20Mini%20AX%20XD4/HelpDesk_download/

If firmware is not yet available for your product, please follow these workarounds to protect your network.

 - Use unique and strong WiFi passwords.
 - Create separate passwords for your WiFi network (SSID) and the admin account for your router's web interface.
 - Connect to websites using the HTTPS encryption protocol whenever possible.
For more information, please refer to https://www.asus.com/support/FAQ/1039292

10/15/2021 ASUS SMM Privilege Security Update (CVE-2021-42055) for ASUS Laptops Vulnerability: CVE-2021-42055

ASUS has released the new BIOS version 303 for the ASUS ZenBook Pro Duo 15 OLED (UX582LR) laptop, which includes important security updates. This latest BIOS update contains fixes for the CVE-2021-42055 vulnerability.


ASUS recommends that all users with the ASUS ZenBook Pro Duo 15 OLED (UX582LR) laptop, running ASUS BIOS version 302 or any prior versions, should update to the latest version 303. To check the installed BIOS version and to download the latest version, visit https://www.asus.com/supportonly/UX582LR/HelpDesk_BIOS/ or update the System Firmware via Microsoft Windows update. https://www.asus.com/support/FAQ/1035492/


ASUS would like to thank SentinelOne® for its assistance with this security update.

05/24/2021 Security advisory for FragAttack

Associated CVE: CVE-2020-24588, CVE-2020-26146, CVE-2020-24587


Severity: Medium


ASUS is aware of newly discovered industry-wide WiFi protocol vulnerabilities that affect every brand of WiFi router. The vulnerabilities are known as Fragmentation and Aggregation Attacks (commonly called Frag Attacks). WiFi devices using the WEP, WPA, WPA2 or WPA3 encryption schemes are affected. FragAttacks can be used to silently steal data, and they can also lead to other exploits.
Please note that an attacker needs to be connected to your WiFi network in order to exploit these vulnerabilities, so they need to be within WiFi signal range and know your WiFi password.


ASUS is working round the clock to release firmware fixes for these vulnerabilities.
Please check the list of router models below for links to updated firmware.

Model name Firmware download path

GT-AXE11000

https://www.asus.com/supportonly/GT-AXE11000/HelpDesk_BIOS/

GT-AX11000

https://rog.asus.com/us/networking/rog-rapture-gt-ax11000-model/helpdesk_bios

GT-AC5300

https://rog.asus.com/networking/rog-rapture-gt-ac5300-model/helpdesk_bios

GT-AC2900

https://rog.asus.com/networking/rog-rapture-gt-ac2900-model/helpdesk_bios

TUF Gaming AX3000

https://www.asus.com/my/Networking-IoT-Servers/WiFi-6/All-series/TUF-Gaming-AX3000/HelpDesk_BIOS/

RT-AX88U

https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX88U/HelpDesk_BIOS/

RT-AX86U

https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX86U/HelpDesk_BIOS/

RT-AX82U

https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX82U/HelpDesk_BIOS/

RT-AX68U

https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX68U/HelpDesk_BIOS/

RT-AX58U

https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX58U/HelpDesk_BIOS/

RT-AX56U

https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX56U/HelpDesk_BIOS/

RT-AX55

https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX55/HelpDesk_BIOS/

RT-AC5300

https://www.asus.com/supportonly/RT-AC5300/HelpDesk_BIOS/

RT-AC88U

https://www.asus.com/supportonly/RT-AC88U/HelpDesk_BIOS/

RT-AC3100

https://www.asus.com/supportonly/RT-AC3100/HelpDesk_BIOS/

RT-AC86U

https://www.asus.com/supportonly/RT-AC86U/HelpDesk_BIOS/

RT-AC2900

https://www.asus.com/supportonly/RT-AC2900/HelpDesk_BIOS/

RT-AC1750_B1

https://www.asus.com/supportonly/RT-AC1750_B1/HelpDesk_BIOS/

RT-AC1900

https://www.asus.com/supportonly/RT-AC1900/HelpDesk_BIOS/

RT-AC1900P

https://www.asus.com/supportonly/RT-AC1900P/HelpDesk_BIOS/

RT-AC1900U

https://www.asus.com/supportonly/RT-AC1900U/HelpDesk_BIOS/

RT-AC66U B1

https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AC66U-B1/HelpDesk_BIOS/

RT-AC68P

https://www.asus.com/supportonly/RT-AC68P/HelpDesk_BIOS/

RT-AC68R

https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/

RT-AC68RF

https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/

RT-AC68RW

https://www.asus.com/supportonly/RT-AC68RW/HelpDesk_BIOS/

RT-AC68U

https://www.asus.com/supportonly/RT-AC68U/HelpDesk_BIOS/

RT-AC68U_WHITE

https://www.asus.com/supportonly/RT-AC68W/HelpDesk_BIOS/

RT-AC68W

https://www.asus.com/supportonly/RT-AC68W/HelpDesk_BIOS/

ZenWiFi AX

https://www.asus.com/supportonly/ASUS%20ZenWiFi%20AX%20(XT8)/HelpDesk_BIOS/

ZenWiFi AX Mini

https://www.asus.com/supportonly/ZenWiFi%20Mini%20AX%20XD4/HelpDesk_BIOS/

If firmware is not yet available for your product, please follow these workarounds to protect your network.

1. Install these three security updates for Windows 10, 8.1 and 7.
 CVE-2020-24587 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-24587
 CVE-2020-24588 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-24588
 CVE-2020-26144 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-26144

2. Follow these security tips to secure your network.
 - Use unique and strong WiFi passwords.
 - Create separate passwords for your WiFi network (SSID) and the admin account for your router's web interface.
 - Connect to websites using the HTTPS encryption protocol whenever possible.
For more information, please refer to https://www.asus.com/support/FAQ/1039292

03/29/2021 ASUS ASMB8-iKVM and ASMB9-iKVM Firmware Security Update for ASUS Server Products

Vulnerability:
CVE-2021-28175, CVE-2021-28176, CVE-2021-28177, CVE-2021-28178, CVE-2021-28179, CVE-2021-28180, CVE-2021-28181, CVE-2021-28182, CVE-2021-28183, CVE-2021-28184, CVE-2021-28185, CVE-2021-28186, CVE-2021-28187, CVE-2021-28188, CVE-2021-28189, CVE-2021-28203, CVE-2021-28204CVE-2021-28205, CVE-2021-28190, CVE-2021-28191, CVE-2021-28192, CVE-2021-28193, CVE-2021-28194, CVE-2021-28195, CVE-2021-28196, CVE-2021-28197, CVE-2021-28198, CVE-2021-28199, CVE-2021-28200, CVE-2021-28201, CVE-2021-28202, CVE-2021-28206, CVE-2021-28207, CVE-2021-28208, CVE-2021-28209


ASUS has released a firmware update for the ASUS ASMB8-iKVM and ASMB9-iKVM server-management modules. This update includes important security updates, and ASUS strongly recommends that users of ASMB8-iKVM and ASMB9-iKVM upgrade the BMC firmware to the latest version.


To check the installed version of ASMB8-iKVM and ASMB9-iKVM and to download the latest version, please visit the relevant ASUS support website. A full list of download links is provided in the below table.

Model Firmware Version ASUS Support Site Path

ASMB8

Z10PA-U8

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_Z10PA-U8.zip

ASMB8

RS700-E8-RS4 V2

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_RS700-E8-RS4_V2.zip

ASMB8

RS700-E8-RS8 V2

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_RS700-E8-RS8_V2.zip

ASMB8

RS720-E8-RS12-X

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_RS720-E8-RS12-X.zip

ASMB8

Z10PR-D16

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_Z10PR-D16.zip

ASMB8

RS500-E8-PS4 V2

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_RS500-E8-PS4_V2.zip

ASMB8

RS500-E8-RS4 V2

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_RS500-E8-RS4_V2.zip

ASMB8

RS500-E8-RS8 V2

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/RS500-E8-RS8-V2/Firmware/ASMB8_FW1161_RS500-E8-RS8_V2.zip

ASMB8

RS520-E8-RS12-E V2

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_RS520-E8-RS12-E_V2.zip

ASMB8

RS520-E8-RS8 V2

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_RS520-E8-RS8_V2.zip

ASMB8

RS500-E8-RS4

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_RS500-E8.zip

ASMB8

RS540-E8-RS36-ECP

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_RS540-E8-RS36-ECP.zip

ASMB8

X99-WS/IPMT

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_X99-WS_IPMI.zip

ASMB8

Z10PE-D16

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_Z10PE-D16.zip

ASMB8

Z10PC-D810G-2S

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_Z10PC-D8_10G-2S.zip

ASMB8

Z10PH-D16

1.16.1

https://dlcdnets.asus.com/pub/ASUS/mb/Socket2011-R3/Z10PH-D16/Firmware/ASMB8_FW1161_Z10PH-D16.zip

ASMB8

RS720Q-E8-RS12

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_RS720Q-E8.zip

ASMB8

Z10PA-D8

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_Z10PA-D8.zip

ASMB8

TS500-E8-PS4 V2

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_TS500-E8-PS4_V2.zip

ASMB8

RS720-E8-RS24-ECP

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_RS720-E8-RS24-ECP.zip

ASMB8

Z10PA-U8

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_Z10PA-U8.zip

ASMB8

RS700-E8-RS4 V2

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_RS700-E8-RS4_V2.zip

ASMB8

RS700-E8-RS8 V2

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_RS700-E8-RS8_V2.zip

ASMB8

RS720-E8-RS12-X

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_RS720-E8-RS12-X.zip

ASMB8

Z10PR-D16

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_Z10PR-D16.zip

ASMB8

RS500-E8-PS4 V2

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_RS500-E8-PS4_V2.zip

ASMB8

RS500-E8-RS4 V2

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_RS500-E8-RS4_V2.zip

ASMB8

RS500-E8-RS8 V2

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/RS500-E8-RS8-V2/Firmware/ASMB8_FW1161_RS500-E8-RS8_V2.zip

ASMB8

RS520-E8-RS12-E V2

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_RS520-E8-RS12-E_V2.zip

ASMB8

RS520-E8-RS8 V2

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_RS520-E8-RS8_V2.zip

ASMB8

RS500-E8-RS4

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_RS500-E8.zip

ASMB8

RS540-E8-RS36-ECP

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_RS540-E8-RS36-ECP.zip

ASMB8

X99-WS/IPMT

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_X99-WS_IPMI.zip

ASMB8

Z10PE-D16

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_Z10PE-D16.zip

ASMB8

Z10PC-D810G-2S

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_Z10PC-D8_10G-2S.zip

ASMB8

Z10PH-D16

1.16.1

https://dlcdnets.asus.com/pub/ASUS/mb/Socket2011-R3/Z10PH-D16/Firmware/ASMB8_FW1161_Z10PH-D16.zip

ASMB8

RS720Q-E8-RS12

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_RS720Q-E8.zip

ASMB8

Z10PA-D8

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_Z10PA-D8.zip

ASMB8

TS500-E8-PS4 V2

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_TS500-E8-PS4_V2.zip

ASMB8

RS720-E8-RS24-ECP

1.16.1

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB8/ASMB8_FW1161_RS720-E8-RS24-ECP.zip

Model Firmware Version ASUS Support Site Path

ASMB9

RS300-E10-PS4

1.15.3

https://dlcdnets.asus.com/pub/ASUS/server/RS300-E10-PS4/FW/ASMB9_FW1153_RS300-E10-PS4.zip

ASMB9

RS300-E10-RS4

1.15.3

https://dlcdnets.asus.com/pub/ASUS/server/RS300-E10-RS4/FW/ASMB9_FW1153_RS300-E10-RS4.zip

ASMB9

RS720-E9-RS8

2.2.1

https://dlcdnets.asus.com/pub/ASUS/server/RS720-E9-RS8/FW/ASMB9_FW221_RS720-E9-RS8.zip

ASMB9

RS720-E9-RS12-E

2.2.1

https://dlcdnets.asus.com/pub/ASUS/server/RS720-E9-RS12-E/BIOS_FW/ASMB9_FW221_RS720-E9-RS12-E.zip

ASMB9

RS720-E9-RS24-E

2.2.1

https://dlcdnets.asus.com/pub/ASUS/server/RS720-E9-RS24-E/RS720-E9-RS24-E_Upgrade_BMC_Firmware_to_2.2.1.zip

ASMB9

RS720-E9-RS8-G

1.15.4

https://dlcdnets.asus.com/pub/ASUS/server/RS720-E9-RS8-G/ASMB9_FW1154_RS720-E9-RS8-G.zip

ASMB9

RS720-E9-RS24-U

1.15.5

https://dlcdnets.asus.com/pub/ASUS/server/RS720-E9-RS24-U/FW/ASMB9_FW1155_RS720-E9-RS24-U.zip.zip

ASMB9

RS700-E9-RS12

2.2.4

https://dlcdnets.asus.com/pub/ASUS/server/RS700-E9-RS12/FW/RS700-E9-RS12_Upgrade_BMC_Firmware_to_2.2.4.zip

ASMB9

RS700-E9-RS4

2.2.4

https://dlcdnets.asus.com/pub/ASUS/server/RS700-E9-RS4/FW/RS700-E9-RS4_Upgrade_BMC_Firmware_to_2.2.4.zip

ASMB9

ESC4000 G4

1.15.7

https://dlcdnets.asus.com/pub/ASUS/server/ESC4000_G4/Driver/ASMB9_FW1157_ESC4000_G4.zip

ASMB9

ESC4000 G4S

1.15.7

https://dlcdnets.asus.com/pub/ASUS/server/ESC4000_G4S/FW/ASMB9_FW1157_ESC4000_G4S.zip

ASMB9

ESC4000 G4X

1.15.7

https://dlcdnets.asus.com/pub/ASUS/server/ESC4000_G4X/FW/ASMB9_FW1157_ESC4000_G4X.zip

ASMB9

RS500-E9-PS4

1.15.5

https://dlcdnets.asus.com/pub/ASUS/server/RS500-E9-PS4/FW/ASMB9_FW1155_RS500-E9-PS4.zip

ASMB9

RS500-E9-RS4

1.15.5

https://dlcdnets.asus.com/pub/ASUS/server/RS500-E9-RS4/FW/ASMB9_FW1155_RS500-E9-RS4.zip

ASMB9

RS500-E9-RS4-U

1.15.5

https://dlcdnets.asus.com/pub/ASUS/server/RS500-E9-RS4-U/BIOS&FW/ASMB9_FW1155_RS500-E9-RS4-U.zip

ASMB9

RS520-E9-RS8

1.15.4

https://dlcdnets.asus.com/pub/ASUS/server/RS520-E9-RS8/fw/ASMB9_FW1154_RS520-E9-RS8.zip

ASMB9

RS520-E9-RS12-E

1.15.4

https://dlcdnets.asus.com/pub/ASUS/server/RS520-E9-RS12-E/fw/ASMB9_FW1154_RS520-E9-RS12-E.zip

ASMB9

RS540-E9-RS36-E

1.15.2

https://dlcdnets.asus.com/pub/ASUS/server/accessory/ASMB9/ASMB9_FW1152_RS540-E9-RS36-E.zip

ASMB9

E900 G4

1.15.2

https://dlcdnets.asus.com/pub/ASUS/server/E900_G4/ASMB9_FW1152_E900-G4.zip

ASMB9

TS700-E9-RS8

1.15.2

https://dlcdnets.asus.com/pub/ASUS/server/TS700-E9/RS8/FW/ASMB9_FW1152_TS700-E9-RS8.zip

ASMB9

KRPA-U16

2.2.5

https://dlcdnets.asus.com/pub/ASUS/mb/SocketSP3(4094)/KRPA-U16/BIOS&FW/KRPA-U16_Upgrade_BMC_Firmware_to_2.2.5.zip

ASMB9

RS500A-E10-PS4

2.2.5

https://dlcdnets.asus.com/pub/ASUS/server/RS500A-10/BIOS&FW/RS500A-E10-PS4_Upgrade_BMC_Firmware_to_2.2.5.zip

ASMB9

RS500A-E10-RS4

2.2.5

https://dlcdnets.asus.com/pub/ASUS/server/RS500A-10/BIOS&FW/RS500A-E10-RS4_Upgrade_BMC_Firmware_to_2.2.5.zip

ASMB9

RS500A-E10-RS12U

2.2.5

https://dlcdnets.asus.com/pub/ASUS/server/RS500A-10/BIOS&FW/RS500A-E10-RS12-U_Upgrade_BMC_Firmware_to_2.2.5.zip

ASMB9

RS700A-E9-RS4V2

2.2.1

https://dlcdnets.asus.com/pub/ASUS/server/RS700A-E9V2/FW/RS700A-E9-RS4V2_Upgrade_BMC_Firmware_to_2.2.1.zip

ASMB9

RS700A-E9-RS12V2

2.2.1

https://dlcdnets.asus.com/pub/ASUS/server/RS700A-E9V2/FW/RS700A-E9-RS12V2_Upgrade_BMC_Firmware_to_2.2.1.zip

ASMB9

RS720A-E9-RS12V2

2.2.1

https://dlcdnets.asus.com/pub/ASUS/server/RS720A-E9V2/FW/RS720A-E9-RS12V2_Upgrade_BMC_Firmware_to_2.2.1.zip

ASMB9

RS720A-E9-RS24V2

2.2.1

https://dlcdnets.asus.com/pub/ASUS/server/RS720A-E9V2/FW/RS720A-E9-RS24V2_Upgrade_BMC_Firmware_to_2.2.1.zip

ASMB9

RS720Q-E9-RS8

1.15.1

https://dlcdnets.asus.com/pub/ASUS/server/RS720Q-E9-RS8/FW/ASMB9_FW1151_RS720Q-E9-RS8.zip

ASMB9

RS720Q-E9-RS24-S

1.15.1

https://dlcdnets.asus.com/pub/ASUS/server/RS720Q-E9-RS24-S/BIOS&FW/ASMB9_FW1151_RS720Q-E9-RS24-S.zip

ASMB9

WS C422 PRO/SE

1.14.2

https://dlcdnets.asus.com/pub/ASUS/mb/Socket2066/WS_C422_PRO_SE/ASMB9_FW1142_WS_C422_PRO_SE.zip

ASMB9

WS X299 PRO/SE

1.14.2

https://dlcdnets.asus.com/pub/ASUS/mb/Socket2066/WS_X299_PRO_SE/FW/ASMB9_FW1142_WS_X299_PRO_SE.zip

ASMB9

E700 G4(ESC700 G4, WS880T)

1.14.2

https://dlcdnets.asus.com/pub/ASUS/server/ESC700_G4_E700_G4/FW/ASMB9_FW1142_ESC700_G4.zip

ASMB9

ESC8000 G4/10G

1.15.5

https://dlcdnets.asus.com/pub/ASUS/server/ESC8000_G4-10G/ASMB9_FW1155_ESC8000_G4_10G.zip

ASMB9

ESC8000 G4

2.2.1

https://dlcdnets.asus.com/pub/ASUS/server/ESC8000_G4/BIOS&FW/ASMB9_FW221_ESC8000_G4_Series_2.2.1.zip

ASMB9

KNPA-U16

1.14.5

https://dlcdnets.asus.com/pub/ASUS/mb/SocketSP3(4094)/KNPA-U16/FW/ASMB9_FW1145_KNPA-U16.zip

ASMB9

RS500A-E9-RS4

1.14.5

https://dlcdnets.asus.com/pub/ASUS/server/RS500A-E9/RS4/FW/ASMB9_FW1145_RS500A-E9-RS4.zip

ASMB9

RS500A-E9-PS4

1.14.5

https://dlcdnets.asus.com/pub/ASUS/server/RS500A-E9/PS4/FW/ASMB9_FW1145_RS500A-E9-PS4.zip

ASMB9

RS500A-E9-RS4-U

1.14.5

https://dlcdnets.asus.com/pub/ASUS/server/RS500A-E9/RS4-U/ASMB9_FW1145_RS500A-E9-RS4-U.zip

ASMB9

PRO WS C621-64L SAGE/10G

1.15.2

https://dlcdnets.asus.com/pub/ASUS/mb/Socket3647/Pro_WS_C621-64L_SAGE_10G/FW/ASMB9_FW1152_PRO_WS_C621_64L_SAGE_10G.zip

ASMB9

PRO E800 G4

1.15.2

https://dlcdnets.asus.com/pub/ASUS/server/Pro_E800_G4/FIRMWARE/ASMB9_FW1152_Pro_E800_G4.zip

ASMB9

Z11PA-U12

1.15.2

https://dlcdnets.asus.com/pub/ASUS/mb/Socket3647/Z11PA-U12/fw/ASMB9_FW1152_Z11PA-U12.zip

ASMB9

ESC4000 DHD G4

1.15.2

https://dlcdnets.asus.com/pub/ASUS/server/ESC4000_DHD_G4/FIRMWARE/ASMB9_FW1152_ESC4000_DHD_G4.zip

ASMB9

TS300-E10-PS4

1.15.3

https://dlcdnets.asus.com/pub/ASUS/server/TS300-E10/PS4/FW/ASMB9_FW1153_TS300-E10-PS4.zip

ASMB9

RS100-E10-PI2

1.15.3

https://dlcdnets.asus.com/pub/ASUS/server/RS100-E10-PI2/FW/ASMB9_FW1153_RS100-E10-PI2.zip

03/24/2021 ASUS SMM Privilege Security Update (CVE-2021-26943) for ASUS SKL Notebook PCs

Vulnerability: CVE-2021-26943


ASUS has released a new BIOS version 304 for ASUS ZenBook Flip UX360CA that includes important security updates. This latest BIOS update contains fixes for the CVE-2021-26943 vulnerability.


ASUS recommends that all users with the ZenBook Flip UX360CA laptop, running ASUS BIOS version 303 or any prior versions, should update to the latest version 304. To check the installed BIOS version and to download the latest version, visit https://www.asus.com/support/FAQ/1045541/

03/09/2021 Security advisory for DNSpooq

Security advisory for DNSpooq

 

CVE: CVE-2020-25681, CVE-2020-25782, CVE-2020-25683, CVE-2020-25684, CVE-2020-25685, CVE-2020-25686, CVE-2020-25687

 

Severity: Medium

 

Abstract

This quick-patch beta firmware was released on February 2, 2021. The first model-specific regular firmware update has just been released, and other models are scheduled to follow in the near future. The beta firmware requires users to perform a manual update.

 

Products from over 40 companies, including ASUS routers, are affected by DNSpooq.

There are two sets of vulnerabilities.

  • Buffer-overflow vulnerabilities: CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687
  • DNS cache-poisoning vulnerabilities: CVE-2020-25684, CVE-2020-25685, CVE-2020-25686

 

No ASUS routers are affected by CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687, because these vulnerabilities only affect DNSSEC.

ASUS routers are only affected by DNS cache-poisoning vulnerabilities, with medium severity. All these vulnerabilities can be fixed by updating to the new firmware.
DNS cache poisoning can potentially allow a remote-code execution that would impact the security of many brands of home router and other networking equipment.

 

 

Affected models

Model name Firmware download path
GT-AX11000 https://rog.asus.com/networking/rog-rapture-gt-ax11000-model/helpdesk_bios
GT-AC5300 https://www.asus.com/Networking/ROG-Rapture-GT-AC5300/HelpDesk_BIOS/
GT-AC2900 https://rog.asus.com/networking/rog-rapture-gt-ac2900-model/helpdesk_bios
TUF-AX3000 https://www.asus.com/my/Networking-IoT-Servers/WiFi-6/All-series/TUF-Gaming-AX3000/HelpDesk_BIOS/
RT-AX92U https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX92U/HelpDesk_BIOS/
RT-AX88U https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX88U/HelpDesk_BIOS/
RT-AX86U https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX86U/HelpDesk_BIOS/
RT-AX82U https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX82U/HelpDesk_BIOS/
RT-AX68U https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX68U/HelpDesk_BIOS/
RT-AX58U https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX58U/HelpDesk_BIOS/
RT-AX56U https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX56U/HelpDesk_BIOS/
RT-AX55 https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX55/HelpDesk_BIOS/
RT-AC5300 https://www.asus.com/supportonly/RT-AC5300/HelpDesk_download/
RT-AC88U https://www.asus.com/supportonly/RT-AC88U/HelpDesk_download/
RT-AC3100 https://www.asus.com/supportonly/RT-AC3100/HelpDesk_download/
RT-AC86U https://www.asus.com/supportonly/RT-AC86U/HelpDesk_download/
RT-AC2900 https://www.asus.com/supportonly/RT-AC2900/HelpDesk_download/
RT-AC1750_B1 https://www.asus.com/supportonly/RT-AC1750_B1/HelpDesk_download/
RT-AC1900 https://www.asus.com/supportonly/RT-AC1900/HelpDesk_download/
RT-AC1900P https://www.asus.com/supportonly/RT-AC1900P/HelpDesk_download/
RT-AC1900U https://www.asus.com/supportonly/RT-AC1900U/HelpDesk_download/
RT-AC66U B1 https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AC66U-B1/HelpDesk_Download/
RT-AC68P https://www.asus.com/supportonly/RT-AC68P/HelpDesk_download/
RT-AC68R https://www.asus.com/supportonly/RT-AC68R/HelpDesk_download/
RT-AC68RF https://www.asus.com/supportonly/RT-AC68RF/HelpDesk_download/
RT-AC68RW https://www.asus.com/supportonly/RT-AC68RW/HelpDesk_download/
RT-AC68U https://www.asus.com/supportonly/RT-AC68U/HelpDesk_download/
RT-AC58U https://www.asus.com/supportonly/RT-AC58U/HelpDesk_download/
RT-AC85U https://www.asus.com/supportonly/RT-AC85U/HelpDesk_download/
RT-AC65U https://www.asus.com/supportonly/RT-AC65U/HelpDesk_download/
RT-AC68U_WHITE https://www.asus.com/supportonly/RT-AC68W/HelpDesk_download/
RT-AC68W https://www.asus.com/supportonly/RT-AC68W/HelpDesk_download/
ZenWiFi AX https://www.asus.com/supportonly/ASUS%20ZenWiFi%20AX%20(XT8)/HelpDesk_download/
ZenWiFi AC https://www.asus.com/supportonly/ASUS%20ZenWiFi%20AC%20(CT8)/HelpDesk_download/
ZenWiFi AC Mini https://www.asus.com/supportonly/ZenWiFi%20AC%20Mini%20(CD6)/HelpDesk_download/
ZenWiFi Mini AX https://www.asus.com/supportonly/ZenWiFi%20Mini%20AX%20XD4/HelpDesk_download/
BlueCave https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/AiMesh-WiFi-Routers-and-Systems/Blue-Cave/HelpDesk_Download/
Lyra https://www.asus.com/supportonly/Lyra/HelpDesk_download/
Lyra mini https://www.asus.com/supportonly/Lyra%20Mini/HelpDesk_download/
Lyra trio https://www.asus.com/supportonly/Lyra%20Trio/HelpDesk_download/

https://www.asus.com/support/FAQ/1008000

https://www.asus.com/support/FAQ/1039292

07/10/2020 ASUS ScreenPad 2 Upgrade Tool Security Update (CVE-2020-15009) for ASUS PCs with ScreenPad 1.0 (UX450FDX, UX550GDX and UX550GEX)

Vulnerability: CVE-2020-15009

AsusScreenXpertServicec.exe and ScreenXpertUpgradeServiceManager.exe in ScreenPad2_Upgrade_Tool.msi V1.0.3 for ASUS PCs with ScreenPad 1.0 (UX450FDX, UX550GDX and UX550GEX) could lead to unsigned code execution with no additional restrictions when a user puts an application at a particular path with a particular file name.

ASUS has released a new version (1.0.4) of the ScreenPad2 Upgrade Tool that includes important security updates. ASUS recommends that users with ASUS PCs with ScreenPad 1.0 (UX450FDX, UX550GDX and UX550GEX) running the ScreenPad2 Upgrade Tool version 1.0.3 or earlier update to the latest version.

To check the installed version of the ScreenPad 2 Upgrade Tool and to download the latest version, visit https://www.asus.com/support/FAQ/1043674

ASUS would like to thank Michael van Griensven for assistance with this security update.

04/14/2020 ASUS Update Regarding Mitigation for Known Intel CPU Vulnerabilities

ASUS is aware of recent security research disclosing potential security vulnerabilities in Intel® CSME, Intel® SPS, Intel® TXE, Intel® AMT, Intel® PTT and/or Intel® DAL chipsets. These vulnerabilities may result in:

  • Improper privilege changes;
  • Denial of service;
  • Disclosure of information.

ASUS is working closely with platform owners to provide firmware and software updates for all affected devices, to mitigate potential risks associated with the vulnerabilities that have been identified.

 

Symptom Description and ASUS Solutions
Please refers to Attachment
Intel-CSME-security-Symptom-Description-and-Solution.pdf

Important Notice: ASUS BIOS Update FAQ

 

PLEASE FREQUENTLY CHECK FOR INFORMATION ABOUT THE LATEST UPDATES AND ADVISORIES FROM ASUS REGARDING YOUR EQUIPMENT AND SOFTWARE. THE INFORMATION PROVIDED IN THIS ADVISORY IS PROVIDED ON AN “AS IS” BASIS WITHOUT ANY WARRANTY OR GUARANTEE OF ANY KIND. ASUS RESERVES THE RIGHT TO CHANGE OR UPDATE THIS ADVISORY AT ANY TIME WITHOUT NOTICE.

04/09/2020 ASUS Device Activation Security Update (CVE-2020-10649) for ASUS Notebook PCs

Vulnerability: CVE-2020-10649

ASUS has released a new version (1.0.7.0) of ASUS Device Activation for Win 10 notebook PCs that includes important security updates. This latest application update contains fixes for the CVE-2020-10649 vulnerability.

ASUS recommends that users with Win 10 notebook PCs running ASUS Device Activation version 1.0.6.0 and all prior versions to update to the latest version. To check the installed version of ASUS Device Activation and to download the latest version, visit https://www.asus.com/support/FAQ/1042640 .

ASUS would like to thank Anas Khan for the assistance with this security update.

03/18/2020 Security Advisory for CVE-2019-15126 (Kr00k)

A new firmware update is now available for selected ASUS routers. This latest firmware update contains fixes for the CVE-2019-15126 (Kr00k) vulnerability, which allows unauthorized decryption of some WPA2-encrypted traffic in devices using some Broadcom and Cypress WiFi chips. This includes some ASUS routers.

We strongly encourage you to periodically audit both your networking equipment and your network security procedures.

We strongly recommend that you update your router to the latest firmware as soon as the new firmware is released. You will find the latest firmware available for download from the ASUS support page https://www.asus.com/support/, or on each model’s official product page. You will find links to the new firmware for selected ASUS routers at the end of this notice. Please note that updated firmware for some models is still undergoing testing, and will be made available as soon as possible.

If you have already installed the latest firmware version, please disregard this notice.

Should you have any questions or concerns, please contact ASUS via our Security Advisory reporting system: https://www.asus.com/securityadvisory/

For further help with router setup and an introduction to network security, please visit

https://www.asus.com/support/FAQ/1008000

https://www.asus.com/support/FAQ/1039292

Model name Support site path Firmware version Ready time
GT-AC5300 https://www.asus.com/us/Networking/ROG-Rapture-GT-AC5300/HelpDesk_BIOS/ 384_81686 Now
RT-AC5300 https://www.asus.com/us/Networking/RT-AC5300/HelpDesk_BIOS/ 384_81624 3/19
RT-AC86U https://www.asus.com/us/Networking/RT-AC86U/HelpDesk_BIOS/ 384_81352 Now
RT-AC2900 https://www.asus.com/Networking/RT-AC2900/HelpDesk_BIOS/ 384_81352 Now
RT-AC3200 https://www.asus.com/Networking/RTAC3200/HelpDesk_BIOS/ 382_51940 3/17
RT-AC1750_B1 https://www.asus.com/supportonly/RT-AC1750_B1/HelpDesk_BIOS/ 385_20253 Now
RT-AC1900 https://www.asus.com/Networking/RT-AC1900/HelpDesk_BIOS/ 385_20253 Now
RT-AC1900P https://www.asus.com/Networking/RT-AC1900P/HelpDesk_BIOS/ 385_20253 Now
RT-AC1900U https://www.asus.com/Networking/RT-AC1900U/HelpDesk_BIOS/ 385_20253 Now
RT-AC66U B1 https://www.asus.com/Networking/RT-AC66U-B1/HelpDesk_BIOS/ 385_20253 Now
RT-AC68P https://www.asus.com/Networking/RTAC68P/HelpDesk_BIOS/ 385_20253 Now
RT-AC68R https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/ 385_20253 Now
RT-AC68RF https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/ 385_20253 Now
RT-AC68RW https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/ 385_20253 Now
RT-AC68U https://www.asus.com/Networking/RTAC68U/HelpDesk_BIOS/ 385_20253 Now
RT-AC68U_WHITE https://www.asus.com/us/Networking/RTAC68W/HelpDesk_BIOS/ 385_20253 Now
RT-AC68W https://www.asus.com/us/Networking/RTAC68W/HelpDesk_BIOS/ 385_20253 Now
ZenWiFi XT8 https://www.asus.com/Networking/ZenWiFi-AX-XT8/HelpDesk_BIOS/ 386_25217 Now
RT-AX88U https://www.asus.com/Networking/RT-AX88U/HelpDesk_BIOS/ 3.0.0.4.384.7997 Now
RT-AX92U https://www.asus.com/Networking/RT-AX92U/HelpDesk_BIOS/ 3.0.0.4.384.8681 Now
GT-AX11000 https://www.asus.com/us/Networking/ROG-Rapture-GT-AX11000/HelpDesk_BIOS/ 3.0.0.4.384.7997 Now
RT-AX58U https://www.asus.com/Networking/RT-AX58U/HelpDesk_BIOS/ 3.0.0.4.384.8563 Now
RT-AC88U https://www.asus.com/us/Networking/RT-AC88U/HelpDesk_BIOS/ 3.0.0.4.384.81790 Now
RT-AC3100 https://www.asus.com/Networking/RT-AC3100/HelpDesk_BIOS/ 3.0.0.4.385.20457 Now
RT-AC1200G https://www.asus.com/Networking/RT-AC1200G/HelpDesk_BIOS/ 3.0.0.4.382.51612 Now
RT-AC1200G https://www.asus.com/Networking/RT-AC1200G-plus/HelpDesk_BIOS/ 3.0.0.4.382.51612 Now
RT-N12 D1 https://www.asus.com/Networking/RTN12_D1/HelpDesk_BIOS/ 3.0.0.4.380.8292 Now


03/09/2020 Security Notice for CVE-2018-18287

Since 2018, ASUS has offered a firmware patch for affected routers to address the CVE-2018-18287 vulnerability, among other important security updates. All later firmware is unaffected.

ASUS recommends all users to always update their routers with the latest firmware. If a router’s firmware is not updated then ASUS strongly recommends to disable remote access from WAN or AiCloud, as well as resetting the router to its default settings. These steps will maximize security.

Users who have already installed the latest firmware version may disregard this notice.

For any questions or concerns, please contact ASUS via our Security Advisory reporting system: https://www.asus.com/securityadvisory/

For further help with router setup and an introduction to network security, please visit:
https://www.asus.com/support/FAQ/1008000
https://www.asus.com/support/FAQ/1039292

Model name Support site path Firmware version Ready time
RT-AC58U https://www.asus.com/Networking/RT-AC58U/HelpDesk_Download/ 382_51939 now
RT-ACRH13 https://www.asus.com/us/Networking/RT-ACRH13/HelpDesk_Download/ 382_51939 now
RT-AC1750_B1 https://www.asus.com/supportonly/RT-AC1750_B1/HelpDesk_BIOS/ 385_20252 now
RT-AC1900 https://www.asus.com/Networking/RT-AC1900/HelpDesk_BIOS/ 385_20252 now
RT-AC1900P https://www.asus.com/Networking/RT-AC1900P/HelpDesk_BIOS/ 385_20252 now
RT-AC1900U https://www.asus.com/Networking/RT-AC1900U/HelpDesk_BIOS/ 385_20252 now
RT-AC3200 https://www.asus.com/Networking/RTAC3200/HelpDesk_BIOS/ 382_51939 now
RT-AC51U https://www.asus.com/Networking/RTAC51U/HelpDesk_BIOS/ 380_8497 now
RT-AC51U+ https://www.asus.com/Networking/RT-AC51U-plus/HelpDesk_BIOS/ 380_10875 now
RT-AC52U B1 https://www.asus.com/Networking/RT-AC52U-B1/HelpDesk_Download/ 380_10875 now
RT-AC66U https://www.asus.com/Networking/RTAC66U/HelpDesk_BIOS/ 382_51641 now
RT-AC66U B1 https://www.asus.com/Networking/RT-AC66U-B1/HelpDesk_BIOS/ 385_20252 now
RT-AC66U_WHITE https://www.asus.com/Networking/RTAC66U/HelpDesk_BIOS/ 382_51641 now
RT-AC68P https://www.asus.com/Networking/RTAC68P/HelpDesk_BIOS/ 385_20252 now
RT-AC68R https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/ 385_20252 now
RT-AC68RF https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/ 385_20252 now
RT-AC58U https://www.asus.com/Networking/RT-AC58U/HelpDesk_Download/ 382_51939 now
RT-ACRH13 https://www.asus.com/us/Networking/RT-ACRH13/HelpDesk_Download/ 382_51939 now
RT-AC1750_B1 https://www.asus.com/supportonly/RT-AC1750_B1/HelpDesk_BIOS/ 385_20252 now
RT-AC1900 https://www.asus.com/Networking/RT-AC1900/HelpDesk_BIOS/ 385_20252 now
RT-AC1900P https://www.asus.com/Networking/RT-AC1900P/HelpDesk_BIOS/ 385_20252 now
RT-AC1900U https://www.asus.com/Networking/RT-AC1900U/HelpDesk_BIOS/ 385_20252 now
RT-AC3200 https://www.asus.com/Networking/RTAC3200/HelpDesk_BIOS/ 382_51939 now
RT-AC51U https://www.asus.com/Networking/RTAC51U/HelpDesk_BIOS/ 380_8497 now
RT-AC51U+ https://www.asus.com/Networking/RT-AC51U-plus/HelpDesk_BIOS/ 380_10875 now
RT-AC52U B1 https://www.asus.com/Networking/RT-AC52U-B1/HelpDesk_Download/ 380_10875 now
RT-AC66U https://www.asus.com/Networking/RTAC66U/HelpDesk_BIOS/ 382_51641 now
RT-AC66U B1 https://www.asus.com/Networking/RT-AC66U-B1/HelpDesk_BIOS/ 385_20252 now
RT-AC66U_WHITE https://www.asus.com/Networking/RTAC66U/HelpDesk_BIOS/ 382_51641 now
RT-AC68P https://www.asus.com/Networking/RTAC68P/HelpDesk_BIOS/ 385_20252 now
RT-AC68R https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/ 385_20252 now
RT-AC68RF https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/ 385_20252 now


02/14/2020 ROG Gaming Center Package Security Update

ASUS update the ROG Gaming Center Package that includes important security updates.
ASUS would like to thank Eli Paz from CyberArk Labs for the assistance with this security update.

11/26/2019 New firmware update for wireless router RT-AC1750_B1/RT-AC1900/RT-AC1900P/RT-AC1900U/RT-AC86U/RT-AC2900/RT-AC3100/RT-AC3200/RT-AC51U/RT-AC51U+/RT-AC52U B1/RT-AC66U/RT-AC66U B1/RT-AC66U_WHITE/RT-AC67U/RT-AC68P/RT-AC68R/RT-AC68RF/RT-AC68RW/RT-AC68U/RT-AC68U 2 Pack/RT-AC68U_WHITE/RT-AC68W/RT-AC750/RT-AC87R/RT-AC87U/RT-AC87W/RT-N66U/RT-N66U_C1/RT-N14U

ASUS is releasing a firmware update for selected routers. Our most recent firmware update contains enhanced security protections against unauthorized access, alteration, disclosure of data, malware, phishing and DDoS attacks.

We strongly encourage you to periodically audit both your equipment and your security procedures, as this will ensure that you will be better protected against unwanted intrusion. As a user of an ASUS router, we advise taking the following actions:

  1. Update your router to the latest firmware. We strongly recommend that you do so as soon as new firmware is released. You will find the latest firmware available for download from the ASUS support page at https://www.asus.com/support/ or the appropriate product page at https://www.asus.com/Networking/. ASUS has provided a link to new firmware for selected routers at the end of this notice.
  2. Set up separate passwords for your wireless network and router-administration page. Use passwords with a length of at least eight characters, including a mix of capital letters, numbers and symbols. Do not use the same password for multiple devices or services.
  3. Enable ASUS AiProtection, if your router supports this feature. Instructions on how to do this can be found in your router’s manual, or on the relevant ASUS support page, at https://www.asus.com/Networking/.


Please note that if you choose not to install this new firmware version then, to avoid any potential unwanted intrusion, we strongly recommend that you disable remote access from WAN or AiCloud, and reset your router to its default settings.

If you have already installed the latest firmware version, please disregard this notice.

Should you have any question or concerns, please contact ASUS via our Security Advisory reporting system: https://www.asus.com/securityadvisory/

For further help with router setup and an introduction to network security, please visit
https://www.asus.com/support/FAQ/1008000
https://www.asus.com/support/FAQ/1039292

Model name Support site path Firmware version Ready time
RT-AC1750_B1 https://www.asus.com/supportonly/RT-AC1750_B1/HelpDesk_BIOS/ 384_81351 now
RT-AC1900 https://www.asus.com/Networking/RT-AC1900/HelpDesk_BIOS/ 384_81351 now
RT-AC1900P https://www.asus.com/Networking/RT-AC1900P/HelpDesk_BIOS/ 384_81351 now
RT-AC1900U https://www.asus.com/Networking/RT-AC1900U/HelpDesk_BIOS/ 384_81351 now
RT-AC86U https://www.asus.com/Networking/RT-AC86U/HelpDesk_BIOS/ 384_81351 now
RT-AC2900 https://www.asus.com/Networking/RT-AC2900/HelpDesk_BIOS/ 384_81351 now
RT-AC3200 https://www.asus.com/Networking/RTAC3200/HelpDesk_BIOS/ 382_51641 now
RT-AC51U https://www.asus.com/Networking/RTAC51U/HelpDesk_BIOS/ 380_8497 now
RT-AC51U+ https://www.asus.com/Networking/RT-AC51U-plus/HelpDesk_BIOS/ 380_10875 now
RT-AC52U B1 https://www.asus.com/Networking/RT-AC52U-B1/HelpDesk_Download/ 380_10875 now
RT-AC66U https://www.asus.com/Networking/RTAC66U/HelpDesk_BIOS/ 382_51634 now
RT-AC66U B1 https://www.asus.com/Networking/RT-AC66U-B1/HelpDesk_BIOS/ 384_81351 now
RT-AC66U_WHITE https://www.asus.com/Networking/RTAC66U/HelpDesk_BIOS/ 384_81351 now
RT-AC67U https://www.asus.com/Networking/AiMesh-AC1900-WiFi-System-RT-AC67U-2-Pack/HelpDesk_BIOS/ 384_81351 now
RT-AC68P https://www.asus.com/Networking/RTAC68P/HelpDesk_BIOS/ 384_81351 now
RT-AC68R https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/ 384_81351 now
RT-AC68RF https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/ 384_81351 now
RT-AC68RW https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/ 384_81351 now
RT-AC68U https://www.asus.com/Networking/RTAC68U/HelpDesk_BIOS/ 384_81351 now
RT-AC68U 2 Pack https://www.asus.com/Networking/AiMesh-AC1900-WiFi-System-RT-AC68U-2-Pack/HelpDesk_BIOS/ 384_81351 now
RT-AC68U_WHITE https://www.asus.com/us/Networking/RTAC68W/HelpDesk_BIOS/ 384_81351 now
RT-AC68W https://www.asus.com/us/Networking/RTAC68W/HelpDesk_BIOS/ 384_81351 now
RT-AC750 https://www.asus.com/supportonly/RT-AC750/HelpDesk_BIOS/ 380_8497 now
RT-AC87R https://www.asus.com/us/supportonly/RT-AC87R/HelpDesk_BIOS/ 382_51641 now
RT-AC87U https://www.asus.com/Networking/RTAC87U/HelpDesk_BIOS/ 382_51641 now
RT-AC87W https://www.asus.com/Networking/RTAC87U/HelpDesk_BIOS/ 382_51641 now
RT-N66U https://www.asus.com/Networking/RTN66U/HelpDesk_BIOS/ 382_51641 now
RT-N66U_C1 https://www.asus.com/Networking/RT-N66U-C1/HelpDesk_BIOS/ 384_81351 now
RT-N14U https://www.asus.com/Networking/RTN14U/HelpDesk_BIOS/ 380_8497 now


11/15/2019 Important information about ASUSWRT security:
  1. ASUSWRT is the name of the router’s firmware and web interface. It does not refer to any iOS, iPadOS or Android app.
  2. ASUS engineers performed internal tests on ASUSWRT using simulated data and there wasn’t any real user data involved in the process. The test is now over and the server has been taken offline since.
  3. Any reports alleging the application of real user data during the ASUSWRT test are inaccurate and misleading.

If there are any questions or concerns, please contact ASUS via our Security Advisory reporting system: https://www.asus.com/securityadvisory/

For further help with router setup and an introduction to network security, please visit https://www.asus.com/support/FAQ/1039292

10/21/2019 ATK Package Security Update (CVE-2019-19235) for ASUS Notebook PCs

Vulnerability:CVE-2019-19235

AsLdrSrv.exe in ASUS ATK Package before V1.0.0061 (for Windows 10 notebook PCs) could lead to unsigned code execution with no additional execution. The user must put an application at a particular path, with a particular file name.

ASUS has released a new version (1.0.0061) of ATK Package for Win 10 notebook PCs that includes important security updates. ASUS recommends that users with Win 10 notebook PCs running ATK Package version 1.0.0060 and all prior versions update to the latest version. To check the installed version of ATK Package and to download the latest version, visit https://www.asus.com/support/faq/1041545.

ASUS would like to thank Peleg Hadar from SafeBreach Labs for the assistance with this security update.

06/14/2019 BIOS Update Announcement for ASUS Notebook PCs

ASUS has released a BIOS update for notebook PCs to ensure a more secure and convenient computing experience. This update only affects users who currently have a password for their BIOS or hard drive. Concerned users with a password should install the new BIOS update via Windows Update or refer to the instruction from https://www.asus.com/support/FAQ/1040162.
*ASUS would like to thank Frédéric Vachon from ESET for helping find out this issue.

05/16/2019 New firmware update for wireless router RT-AC1750_B1/RT-AC1900/RT-AC1900P/RT-AC1900U/RT-AC2900/RT-AC3100/RT-AC3200/RT-AC51U/RT-AC5300/RT-AC56S/RT-AC56U/RT-AC66U/RT-AC66U B1/RT-AC66U_WHITE/RT-AC67U/RT-AC68P/RT-AC68R/RT-AC68RF/RT-AC68RW/RT-AC68U/RT-AC68U 2 Pack/RT-AC68U_WHITE/RT-AC68W/RT-AC750/RT-AC86U/RT-AC87R/RT-AC87U/RT-AC87W/RT-AC88U/RT-N18U/RT-N66U/RT-N66U_C1

ASUS is releasing a firmware update for selected routers. Our most recent firmware update contains enhanced security protections against unauthorized access, alteration, disclosure of data, malware, phishing and DDoS attacks.

We strongly encourage you to periodically audit both your equipment and your security procedures, as this will ensure that you will be better protected against unwanted intrusion. As a user of an ASUS router, we advise taking the following actions:

  1. Update your router to the latest firmware. We strongly recommend that you do so as soon as new firmware is released. You will find the latest firmware available for download from the ASUS support page at https://www.asus.com/support/ or the appropriate product page at https://www.asus.com/Networking/. ASUS has provided a link to new firmware for selected routers at the end of this notice.
  2. Set up separate passwords for your wireless network and router-administration page. Use passwords with a length of at least eight characters, including a mix of capital letters, numbers and symbols. Do not use the same password for multiple devices or services.
  3. Enable ASUS AiProtection, if your router supports this feature. Instructions on how to do this can be found in your router’s manual, or on the relevant ASUS support page, at https://www.asus.com/Networking/.


Please note that if you choose not to install this new firmware version then, to avoid any potential unwanted intrusion, we strongly recommend that you disable remote access from WAN or AiCloud, and reset your router to its default settings.

If you have already installed the latest firmware version, please disregard this notice.

Should you have any question or concerns, please contact ASUS via our Security Advisory reporting system: https://www.asus.com/securityadvisory/

For further help with router setup and an introduction to network security, please visit
https://www.asus.com/support/FAQ/1008000
https://www.asus.com/support/FAQ/1039292

Model name Support site path Firmware version Ready time
RT-AC1750_B1 https://www.asus.com/supportonly/RT-AC1750_B1/HelpDesk_BIOS/ 384_45717 now
RT-AC1900 https://www.asus.com/Networking/RT-AC1900/HelpDesk_BIOS/ 384_45717 now
RT-AC1900P https://www.asus.com/Networking/RT-AC1900P/HelpDesk_BIOS/ 384_45717 now
RT-AC1900U https://www.asus.com/Networking/RT-AC1900U/HelpDesk_BIOS/ 384_45717 now
RT-AC2900 https://www.asus.com/Networking/RT-AC2900/HelpDesk_BIOS/ 384_45717 now
RT-AC3100 https://www.asus.com/Networking/RT-AC3100/HelpDesk_BIOS/ 384_45717 now
RT-AC3200 https://www.asus.com/Networking/RTAC3200/HelpDesk_BIOS/ 382_51634 now
RT-AC51U https://www.asus.com/Networking/RTAC51U/HelpDesk_BIOS/ 380_8496 now
RT-AC5300 https://www.asus.com/Networking/RT-AC5300/HelpDesk_BIOS/ 384_45717 now
RT-AC56S https://www.asus.com/Networking/RTAC56S/HelpDesk_BIOS/ 382_51634 now
RT-AC56U https://www.asus.com/Networking/RTAC56U/HelpDesk_BIOS/ 382_51634 now
RT-AC66U https://www.asus.com/Networking/RTAC66U/HelpDesk_BIOS/ 382_51634 now
RT-AC66U B1 https://www.asus.com/Networking/RT-AC66U-B1/HelpDesk_BIOS/ 384_45717 now
RT-AC66U_WHITE https://www.asus.com/Networking/RTAC66U/HelpDesk_BIOS/ 382_51634 now
RT-AC67U https://www.asus.com/Networking/AiMesh-AC1900-WiFi-System-RT-AC67U-2-Pack/HelpDesk_BIOS/ 384_45717 now
RT-AC68P https://www.asus.com/Networking/RTAC68P/HelpDesk_BIOS/ 384_45717 now
RT-AC68R https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/ 384_45717 now
RT-AC68RF https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/ 384_45717 now
RT-AC68RW https://www.asus.com/supportonly/RT-AC68R/HelpDesk_BIOS/ 384_45717 now
RT-AC68U https://www.asus.com/Networking/RTAC68U/HelpDesk_BIOS/ 384_45717 now
RT-AC68U 2 Pack https://www.asus.com/Networking/AiMesh-AC1900-WiFi-System-RT-AC68U-2-Pack/HelpDesk_BIOS/ 384_45717 now
RT-AC68U_WHITE https://www.asus.com/us/Networking/RTAC68W/HelpDesk_BIOS/ 384_45717 now
RT-AC68W https://www.asus.com/us/Networking/RTAC68W/HelpDesk_BIOS/ 384_45717 now
RT-AC750 https://www.asus.com/supportonly/RT-AC750/HelpDesk_BIOS/ 380_8496 now
RT-AC86U https://www.asus.com/Networking/RT-AC86U/HelpDesk_BIOS/ 384_45717 now
RT-AC87R https://www.asus.com/us/supportonly/RT-AC87R/HelpDesk_BIOS/ 382_51634 now
RT-AC87U https://www.asus.com/Networking/RTAC87U/HelpDesk_BIOS/ 382_51634 now
RT-AC87W https://www.asus.com/Networking/RTAC87U/HelpDesk_BIOS/ 382_51634 now
RT-AC88U https://www.asus.com/Networking/RT-AC88U/HelpDesk_BIOS/ 384_45717 now
RT-N18U https://www.asus.com/supportonly/RT-N18U/HelpDesk_BIOS/ 382_51634 now
RT-N66U https://www.asus.com/Networking/RTN66U/HelpDesk_BIOS/ 382_51636 now
RT-N66U_C1 https://www.asus.com/Networking/RT-N66U-C1/HelpDesk_BIOS/ 384_45717 now


05/02/2019 Latest software announcement for ZenFone devices

ASUS is aware of the vulnerability listed below. We take your security seriously and are working diligently to provide a software update for the affected ZenFone models. Please update your ZenFone to the latest software version as soon as it becomes available. In the meantime, we highly recommended using ASUS Mobile Manager or installing another reliable third-party security app to further secure your devices.

Possible vulnerability:
ASUS Contact

  • Private contacts’ user profiles (name, call log, settings) are liable to be accessed, added or deleted.
  • Information of blacklist (blocked phone numbers) is liable to be accessed, added or deleted.

ASUS Message
  • Private message may be leaked.
  • Any apps can send voice messages without user’s permission.

ASUS Launcher
  • No permissions required to unlock app

The following are some security precautions recommended for all users:
(1) Ensure your operating system and software up to date with the latest version, which you can find on the ASUS website (www.asus.com). Using the search tool located on the top right hand of the ASUS website, search for your device model, and then follow this path: Support > Driver & Utility > Driver & Tools > BIOS & Firmware. Here you can double check if the latest version is the same on your device or you can choose to download it in the event your device did not automatically update.
(2) Do not download any apps outside of Google Play.
(3) Uninstall all apps previously downloaded from non-Google Play sources.
(4) Install ASUS Mobile Manager or a reliable third-party security app to strengthen the security of your devices and applications.


08/14/2018 Security advisory for OpenVPN server

Vulnerability: OpenVPN users are able to log in to the web UI with their password

Solution:
Please immediately update ASUS router's firmware
If a firmware update cannot be made the mitigations listed below should be applied, however it’s strongly advised the user updates the firmware at the earliest opportunity:
• Disable VPN (available on limited models)
• Change login ID & password again. The password should be at least 8 characters using a mix of letters, numbers and special symbols.

Affected Products
Model Firmware(Minimum Recommended Version)
BRT-AC828 3.0.0.4.380.7526
GT-AC5300 3.0.0.4.384.21045
RT-AC5300 3.0.0.4.384.20942
RT-AC88U 3.0.0.4.384.20942
RT-AC3200 3.0.0.4.382.50470
RT-AC3100 3.0.0.4.384.20942
RT-AC88U 3.0.0.4.382.50702
RT-AC88R 3.0.0.4.382.50702
RT-AC86U 3.0.0.4.384.21045
RT-AC2900 3.0.0.4.384.21045
RT-AC68U 3.0.0.4.384.20942
RT-AC68R 3.0.0.4.384.20942
RT-AC68P 3.0.0.4.384.20942
RT-AC68W 3.0.0.4.384.20942
RT-AC68UF 3.0.0.4.384.20942
RT-AC1900U 3.0.0.4.384.20942
RT-AC1900 3.0.0.4.384.20942
RT-AC56U 3.0.0.4.382.50624
RT-AC56S 3.0.0.4.382.50624
RT-AC66U_B1 3.0.0.4.384.20942
RT-AC1750_B1 3.0.0.4.384.20942
RT-AC66U 3.0.0.4.382.50470
RT-AC66R 3.0.0.4.382.50470
RT-AC66W 3.0.0.4.382.50470
RT-AC55UHP 3.0.0.4.382.50470
RT-AC55U 3.0.0.4.382.50470
RT-AC1200G 3.0.0.4.382.50624
RT-AC1200G+ 3.0.0.4.382.50624
RT-N800HP 3.0.0.4.382.50470
RT-N66U_C1 3.0.0.4.384.20942
RT-N66U 3.0.0.4.382.50470
RT-N18U 3.0.0.4.382.50470
Lyra 3.0.0.4.382.11600
Lyra mini 3.0.0.4.382.11600
Lyra Trio 3.0.0.4.382.20208
BlueCave 3.0.1.4.383.19267


08/07/2018 Latest software announcement for ZenFone/ZenPad devices

ASUS is aware of the vulnerability listed below. We take your security seriously and are working diligently to provide a software update for the affected ZenFone/ZenPad models. Please update your ZenFone/ZenPad to the latest software version as soon as it becomes available. In the meantime, we highly recommended using ASUS Mobile Manager or installing another reliable third-party security app to further secure your devices.

Possible vulnerability:
• A malicious app can get a bug report.
• A malicious app can take a screenshot (with a screenshot animation).
• Arbitrary apps can be installed remotely over the internet and can also be uninstalled after being run.
• Commands can be executed as the system user.

The following are some security precautions recommended for all users:
(1) Ensure your operating system and software up to date with the latest version, which you can find on the ASUS website (www.asus.com). Using the search tool located on the top right hand of the ASUS website, search for your device model, and then follow this path: Support > Driver & Utility > Driver & Tools > BIOS & Firmware. Here you can double check if the latest version is the same on your device or you can choose to download it in the event your device did not automatically update.
(2) Do not download any apps outside of Google Play.
(3) Uninstall all apps previously downloaded from non-Google Play sources.
(4) Install ASUS Mobile Manager or a reliable third-party security app to strengthen the security of your devices and applications.

06/08/2018 Security advisory for VPNFilter malware

Talos Intelligence recently discovered that VPNFilter is targeting more makes and models than initial release, and the following ASUS routers may be potential targets:
RT-AC66U
RT-N10 (EOL)
RT-N10E (EOL)
RT-N10U (EOL)
RT-N56U (EOL)
RT-N66U

To help owners of these routers take necessary precautions, we compiled a security checklist:
(1) Reset the device to factory default: Hold the Reset button in the rear for at least five seconds until the power LED starts blinking.
(2) Update all devices to the latest firmware.
(3) Ensure default admin password had been changed to a more secure one.
(4) Disable Remote Management (disabled by default, can only be enabled via Advanced Settings).
(5) Enable the URL filter in the Advanced Settings -> Firewall. Set the Filter table type as Black List. Add the "photobucket" and "toknowall" in the URL filter list.

For any users with the EOL models listed above, we strongly advise upgrading to a router with AiProtection. A wide selection of ASUS and ROG routers offer AiProtection powered by Trend Micro™. Anytime a threat is detected, the connection between your device and the malicious server is blocked before any personal data is compromised. The list of malicious servers is constantly updated by syncing with the Trend Micro cloud database automatically, to ensure your network environment is secure around the clock.

04/03/2018 Security Vulnerability Notice (CVE-2018-5999, CVE-2018-6000) for ASUS routers

Vulnerability: CVE-2018-5999, CVE-2018-6000

ASUS and ROG router products affected are shown in a list below.

This vulnerability bypasses any user/password changes made by the owner.
Possible changes to router settings:

  • Port number changes
  • VPN account & password changes
  • DDNS changes
  • The UI language has changed

Solution:
Please immediately update your ASUS and ROG router to the latest firmware available.
If a firmware update cannot be made the mitigations listed below should be applied, however it’s strongly advised the user updates the firmware at the earliest opportunity:

  • Disable SSH / Telnet
  • Disable VPN (available on limited models)
  • Enable AiProtection (available on limited models)
  • Change login ID & password again. The password should be at least 8 characters using a mix of letters, numbers and special symbols.

Affected Products:
Model Firmware (Minimum Recommended Version)
BRT-AC828 3.0.0.4.380.7432
GT-AC5300 3.0.0.4.384.20287
RT-AC5300 3.0.0.4.384.20287
RT-AC88U 3.0.0.4.384.10007
RT-AC3100 3.0.0.4.384.10007
RT-AC86U 3.0.0.4.384.10007
RT-AC2900 3.0.0.4.384.10007
RT-AC68 series 3.0.0.4.384.10007
RT-AC1900 series 3.0.0.4.384.10007
RT-AC66U_B1 3.0.0.4.384.10007
RT-AC1750_B1 3.0.0.4.384.10007
RT-AC87 series 3.0.0.4.382.50010
RT-AC3200 3.0.0.4.382.50010
RT-AC56U 3.0.0.4.382.50010
RT-AC55U 3.0.0.4.382.50018
RT-AC1200 3.0.0.4.380.10446
RT-N18U 3.0.0.4.382.39935
RT-AC51U+ 3.0.0.4.380.10446
RT-AC52U_B1 3.0.0.4.380.10446
Lyra 3.0.0.4.382.11572
Lyra mini 3.0.0.4.382.11572
RT-AC66U 3.0.0.4.380.8228
RT-N66U 3.0.0.4.380.8228
RT-N600 3.0.0.4.380.10446
RT-AC1200GU 3.0.0.4.380.10446
RT-AC1200G 3.0.0.4.382.50276
RT-AC1200G+ 3.0.0.4.382.50276
RT-AC53 3.0.0.4382.10446
RT-AC750GF 3.0.0.4382.10446
RT-AC53U 3.0.0.4.380.8228
RT-N12_D1 3.0.0.4.380.8228
RT-N12HP_B1 3.0.0.4.380.8228
RT-AC56S 3.0.0.4.382.50624
RT-N14U 3.0.0.4.380.8285
RT-N14UHP 3.0.0.4.380.8287
RT-AC54U 3.0.0.4.380.8228
RT-ACRH17 3.0.0.4.382.50243
RT-AC55UHP 3.0.0.4.382.50276
RT-N300 3.0.0.4.380.8228
RT-AC1200HP 3.0.0.4.380.8228
RT-AC51U 3.0.0.4.380.8228
RT-AC750 3.0.0.4.380.8228
RT-AC52U 3.0.0.4.380.8241
RT-AC58U 3.0.0.4.380.8228
RT-ACRH13 3.0.0.4.380.8228
RT-AC1300UHP 3.0.0.4.380.8228
RT-N11P_B1 3.0.0.4.380.10410
RT-N300_B1 3.0.0.4.380.10410
RT-N12 VP_B1 3.0.0.4.380.10410
RT-N12+ B1 3.0.0.4.380.10410
RT-N12+ PRO 3.0.0.4.380.10410
RT-N12E C1 3.0.0.4.380.10410


12/30/2017 New firmware available for Wireless Router GT-AC5300/ RT-AC5300/ RT-AC88U/ RT-AC3100/ RT-AC87U/ RT-AC87R/ RT-AC3200/ RT-AC86U/ RT-AC68 series/ RT-AC55U/ RT-N18U/
10/31/2017 Update on security advisory for the vulnerability of WPA2 protocol

ASUS is working closely with chipset suppliers to resolve the vulnerability in the WPA2 security protocol, which affects some but not all ASUS products (check the list below). KRACK can exploit the vulnerability only under certain conditions highlighted in the previous update. Your network configuration is more secure when under these conditions:

(1) Routers and gateways working in their default mode (Router Mode) and AP Mode.
(2) Range extenders working in AP Mode.
(3) When Powerline adapters and switch products are used.

ASUS is working actively towards a solution, and will continue to post software updates. Find out more: https://www.asus.com/support/

Full list of routers unaffected by KRACK while in default mode:
GT-AC5300
RT-AC1200
RT-AC1200G
RT-AC1200G Plus
RT-AC1200HP
RT-AC1300HP
RT-AC1900
RT-AC1900P
RT-AC3100
RT-AC3200
RT-AC51U
RT-AC52U
RT-AC53
RT-AC5300
RT-AC53U
RT-AC54U
RT-AC55U
RT-AC55UHP
RT-AC56S
RT-AC56U
RT-AC58U
RT-AC66U
RT-AC66U B1
RT-AC66W
RT-AC68P
RT-AC68UF
RT-AC68W
RT-AC86U
RT-AC87U
RT-AC88U
RT-ACRH17
RT-ACRH13
RT-N10P V3
RT-N11P B1
RT-N12 D1
RT-N12 VP B1
RT-N12+
RT-N12+ B1
RT-N12E C1
RT-N12E_B1
RT-N12HP B1
RT-N14U
RT-N14UHP
RT-N16
RT-N18U
RT-N300 B1
RT-N56U
RT-N56U B1
RT-N65U
RT-N66U
RT-N66W
BRT-AC828
DSL-AC87VG
DSL-AC52U
DSL-AC55U
DSL-AC56U
DSL-AC68R
DSL-AC68U
DSL-N10_C1
DSL-N12E_C1
DSL-N12HP
DSL-N12U
DSL-N12U B1
DSL-N12U D1
DSL-N12U_C1
DSL-N14U
DSL-N14U B1
DSL-N16
DSL-N16U
DSL-N17U
DSL-N55U D1
DSL-N55U_C1
4G-AC68U
RT-AC65U
RT-AC85U

10/18/2017 Security advisory for the vulnerabilities of WPA2 protocol

ASUS is aware of the recent WPA2 vulnerability issue. We take your security and privacy seriously and are currently working towards a full solution as quickly as possible. In the meantime, we want to help clarify the severity of the potential threat, and let our valued customers know the appropriate steps to take in order to avoid or lessen the threat of being compromised.

Your devices are only vulnerable if an attacker is in physical proximity to your wireless network and is able to gain access to it. This exploit cannot steal your banking information, passwords, or other data on a secured connection that utilizes proper end-to-end encryption. However, an attacker could capture and read this information on an unsecured connection via an exploited WiFi network. Depending on the network configuration, it is also possible for the attacker to redirect network traffic, send invalid data to devices or even inject malware into the network.

We are feverishly working with chipset suppliers to resolve this vulnerability and will release patched firmware for affected routers in the near future. Before this patched firmware is released, here are a few cautions all users should take:

(1) Avoid public Wi-Fi and Hotspots until the routers and your devices are updated. Use cellular network connections if possible.
(2) Only connect to secured services that you trust or have been verified. Web pages that use HTTPS or another secure connection will include HTTPS in the URL. If the connection is secured using TLS 1.2 your activities with that service is safe for now.
(3) Keep your operating system and antivirus software up-to-date. Microsoft recently updated Windows to fix this exploit on their latest operating systems. Google and Apple are following suit shortly.
(4) When in doubt, be safe and use your cellular network or a wired connection (Ethernet) to access the internet. This exploit only affects 802.11 traffic between a Wi-Fi router and a connected device on an exploited WiFi connection.

04/26/2017 New firmware available for Wireless Router RT-AC88U/ Wireless Router RT-AC66U B1
04/24/2017 New firmware available for Wireless Router RT-AC5300/ Wireless Router RT-AC3100
04/14/2017 New firmware available for Wireless Router RT-AC53
03/31/2017 New firmware available for Wireless Router RT-AC87U/ RT-AC87R/ RT-AC3200/ RT-AC68U/ RT-AC68R/ RT-AC68W/ RT-AC68P/ RT-AC1900P/ RT-AC66U/ RT-AC66R/ RT-AC1750/ RT-AC56U/ RT-AC56R/ RT-N66U/ RT-N66R/ RT-N66W/ RT-AC53U/ RT-AC51U/ RT-AC750/ RT-N300/ RT-N11P/ RT-N12+/ RT-N12+ Pro/ RT-N12E B1/
03/24/2017 New software available for Wireless Adapter PCE-AC56
12/23/2016 New firmware available for Wireless Router RT-AC5300 / RT-AC88U / RT-AC3100 / RT-AC3200 / RT-AC87U / RT-AC87R / RT-AC66U / RT-AC66W / RT-AC1750 / RT-AC55UHP / RT-AC55U / RT-AC52U / RT-N56U / RT-N12 D1
12/13/2016 New firmware available for Wireless Router RT-AC68U / RT-AC68R / RT-AC68W / RT-AC68UF / RT-AC68P / RT-AC1900P / RT-AC1900 / RT-AC66U_B1
10/29/2016 New firmware available for Repeater RP-N12 / RP-N14 / RP-N53 / RP-AC52/ RP-AC56/ Media Bridge EA-N66/ EA-N66R

10/17/2016 New ATK driver available for Notebook K53SV
09/10/2016 New firmware available for Wireless Router RT-AC66U / RT-AC66R / RT-AC66W / RT-AC1750

Hall of fame

We would like to thank the following people have made responsible disclosures to us. They were very first reporters to notified qualifying vulnerabilities which consented to be fixed by ASUSTek Computer Inc. Thank you and congratulations for demonstrating your technical skill, security knowledge, and responsible behavior.

2024 ∇
September 2024:
  • Behnam Abbasi Vanda
  • Hoang Quoc Thinh from Verichains.io
  • Shadi Kamal
  • Daniel Fernando Soriano Espinosa
  • William Bastos @chor4o
June 2024:
  • Zhao Jiaxu from IIE of CAS
  • Demewoz Agegnehu / Sabean Technology
May 2024:
  • Ahmed Mustafa (Bondug)
  • Anupam Simon Masih
  • chumen77
  • Allen Yang
April 2024:
  • Gábor Selján
  • TOUHAMI KASBAOUI
  • Rathod Sameer
February 2024:
  • Aditya Singh
  • YoKo Kho from HakTrak Cybersecurity Squad
  • swing from Chaitin Security Research Lab
  • Viktor Edstrom
  • Yuheng Zhu(@xpzhxhm)
  • xiosec
  • Hassan Mohammadi
January 2024:
  • Gábor Selján, BugProve Inc
  • YoKo Kho from HakTrak Cybersecurity Squad (HakTrak.com)
  • Ahliman Gadashov ~ AzNet
  • Shivang Maurya
2023 ∇
December 2023:
  • RashidKhan Pathan (Offensive Security Researcher)
November 2023:
  • Parag Bagul
  • Carlos Köpke
  • Nguyen Trung Khanh
September 2023:
  • Shivani Gundluru
  • Swings and Wang Duo from Chaitin Security Research Lab
  • C0ss4ck from Bytedance Wuheng Lab
  • 费新程 from X1cT34m
  • Sheshank Shekhar Pandey(Mithun.1999)
August 2023:
  • Tirth A Patel
  • Defenzelite Security
July 2023:
  • Zichuan Li(@Ri7erLi) from Indiana University Bloomington
  • Another1024
  • Jincheng Wang from X1cT34m Laboratory of Nanjing University of Posts and Telecommunications
  • Howard McGreehan
Jane 2023:
  • Aayush Samriya (maay)
April 2023:
  • Naresh Adhikari (@Nareshx4235)
  • Aayush Samriya
  • Swing and Wang Duo from Chaitin Security Research Lab
  • C0ss4ck from Bytedance Wuheng Lab
  • 费新程 from X1cT34m
March 2023:
  • Everton Silva (@hydd3n.sec)
  • xveysel10
  • Chengfeng Ye, Prism Research Group - cse hkust
  • Yasser Alenazi - Twitter (@firfox20)
  • Amit Vishwakarma
  • Howard McGreehan
  • Jinghe Gao
  • Xingyu Xu(@tmotfl)
  • junxu(Hillstone Network Security Research Institute)
  • Luiz Eduardo Prestes (Camberty)
February 2023:
  • Suprit P. (s3ctat0r)
January 2023:
  • Ori Levi
2022 ∇
September 2022:
  • Martin Kibuchi
  • Nuttakorn Tungpoonsup & Sittikorn Sangrattanapitak & Ammarit Thongthua @Secure D Global : Vulnerability Research Team
August 2022:
  • Abdul Rauf
  • Mohamad Takrory
  • Yagnik Bhuva
  • David Ward
  • HeeChan Kim of TeamH4C
July 2022:
  • Abdul Rauf
  • Vishal Patidar
  • Steven Sroba
  • Rahul Thanth
June 2022:
  • Anas khan
  • Abdul Rauf
  • Aman Singh
April 2022:
  • Chetanya Sharma
  • 顾洪利 (Holy Gu)
March 2022:
  • Ramkrishna Sawant
  • Miguel Santareno
  • Trend Micro Research
February 2022:
  • Akash Verma
  • Howard McGreehan
  • Kari Hulkko and Tuomo Untinen from The Synopsys Cybersecurity Research Center (CyRC)
  • Sk md Sahil
January 2022:
  • Samprit Das (sampritdas8)
  • Milan Kyselica of IstroSec
  • Denis Faiustov, Ruslan Sayfiev of Ierae Security
2021 ∇
December 2021:
  • Balamurugan A
  • Hector flores
  • @Gaurav Dalal (webcipher101)
  • CyberNow Labs Red Team
  • Kartik Singh
November 2021:
  • Abilash.V.L
  • Aswin Reji
  • Hardik Rathod
  • Jacques Mister
  • Jaydev Ahire
  • Naveen Kumawat(@nvk0x)
  • Rohan Panchal
  • Sayeed Shaik
  • HP of Cyber Kunlun Lab
  • Luke Walker – SmartDCC
  • Fans0n、le3d1ng、Mwen、daliy yang from 360 Future Security Labs
  • @d0gkiller87
October 2021:
  • Ganga Manivannan
  • Huli (From Cymetrics/OneDegree)
  • Kandarpdave Dave
  • Rakan Abdulrahman Al Khaled
  • Sabarinath Panikan
  • Efstratios Chatzoglou, University of the Aegean, Georgios Kambourakis, European Commission at the European Joint Research Centre, and Constantinos Kolias, University of Idaho
  • CataLpa from DBappSecurity Co.,Ltd Hatlab.
  • Yao Chen(@ysmilec) of 360 Alpha Lab
September 2021:
  • Arjun-E
  • Mahmoud Reda
  • Jiawei Yin(@yngweijw)
  • Federico Lagrasta
August 2021:
  • Nasser Altowairqi (@r00t_nasser)
  • Shuvam Adhikari of SSCSS Nepal
  • Jixing Wang (@chamd5)
July 2021:
  • Abhishek Vishwakarma
  • Quentin Kaiser from IoT Inspector Research Lab
  • Aytac Kalinci
June 2021:
  • Subash Giri
  • Efstratios Chatzoglou, University of the Aegean
  • Georgios Kambourakis, European Commission at the European Joint Research Centre
  • Constantinos Kolias, University of Idaho
May 2021:
  • Jebarson Immanuel
  • Krishna Chaitanya A
  • Ricardo J Marques Montilla
April 2021:
  • Ashik Kunjumon
  • Deepak Kumar Singh
  • ZeddYu Lu
March 2021:
  • Ye Li (From Tencent Security Xuanwu Lab.)
  • Zhuo Ma (From Tencent Security Xuanwu Lab.)
  • Chris Bellows, Darren Kemp – Atredis Partners
  • Milan Kyselica and Roman Stevanak LIFARS
  • 李想 清华大学NISL实验室
  • Abdulaziz Almisfer
  • Bader Almutairi
  • Chirag Soni
  • Harinder Singh
  • Denis Straghkov, Grigoriy Ivanov, Palchikov Pavel
February 2021:
  • Daniel Moura (@opps3c)
  • Pankaj Thakur
  • Wai Yan Aung
  • Denis Straghkov, Grigoriy Ivanov, Palchikov Pavel
  • Jehad Al-qurashi (TW : Je_1r)
  • Omar Al-talhi (IG : eltd)
  • Ali Al-shehri(IG : zi9r)
  • Khalid Al-harthi (IG : luis90o)
2020 ∇
December 2020:
  • Muhammed Sadettin KARATAŞ
  • Tolgahan Demirayak
  • 施伟铭 @ 长亭科技
November 2020:
  • Md. Nur A Alam Dipu
  • Fatih Çelik
  • Бодиштяну Богдан
October 2020:
  • Dasari Chandra Mouli (@chanducs_)
  • Gal Nagli (@naglinagli)
  • Md. Nur A Alam Dipu
  • swings & leommxj &chennan, from Chaitin Security Research Lab.
September 2020:
  • Siwong kim (@SNTWORKS)
  • Santosh Kumar
  • Matt Moran
  • Marc Ruef
  • Jai Kumar B
  • Gal Nagli (@naglinagli)
  • Vedant Tekale (@_justynot)
August 2020:
  • Prince Prafull
  • Gal Nagli
  • Ahmad A Abdulla
  • Robert Chen
  • tejas.pingulkar
July 2020:
  • Mritunjay Kumar
  • Matt Moran
  • Rhitik Wadhvana
  • Robert Foggia
June 2020:
  • Ahmet Said Göksu
  • Amr Al Hallak
  • Mehmet Can GÜNEŞ
  • Niels Teusink
  • Michael van Griensven
May 2020:
  • Agrah Jain
  • Mehedi Hasan Remon (@mehedi1194)
  • Naveen Kumawat (nvk)
  • Salonee Jaiswal
  • Shankar R
  • Wai Yan Aung
April 2020:
  • Jinwei Chen (Bangcle Security)
  • SecurityMate (@securitymate)
  • Steffin Stanly
  • Wai Yan Aung
March 2020:
  • Hein HtetAung
  • Lütfü Mert Ceylan
  • Wai Yan Aung
  • Yusuf Kocadaş
February 2020:
  • Ishan Anand
  • João Varelas
  • مصطفى محمود
  • Romon Wafa
  • Wai Yan Aung
January 2020:
  • Joby Y Daniel
  • Pritam Mukherjee
  • Raphael Karger
  • Wai Yan Aung
2019 ∇
December 2019:
  • Sonam Kumar
  • pr0v3rbs of KAIST SysSec
  • Martin Rakhmanov
November 2019:
  • Mustafa Diaa (@c0braBaghdad1)
  • Hasnain Shaukat
  • Wai Yan Aung
October 2019:
  • Matt Langlois
  • Pankaj Kumar Thakur (NEPAL)
  • Rafid Hasan Khan
  • S Naveen Kumar, Ernst & Young (Chennai), Security Analyst
  • Satish Khadka
  • Sourajeet Majumder
  • Wai Yan Aung
  • Peleg Hadar from SafeBreach Labs
September 2019:
  • Ahmad Halabi
  • Moaied Nagi Hassan(moonlight)
  • Mustafa Diaa (@c0braBaghdad1 )
  • Sourajeet Majumder
  • Wai Yan Aung
August 2019:
  • Pankaj Kumar Thakur (Nepal)
  • Mustafa Diaa (@c0braBaghdad1 )
  • Wai Yan Aung
  • Athanasios Tserpelis of Telspace Systems
July 2019:
  • Mohammed Ahmad
  • Wai Yan Aung
June 2019:
  • Naufal Septiadi
  • Sattar Jabbar
  • S1mba Lu
May 2019:
  • Leron Gray
  • Mark Wemhöner
  • Matt Cundari
  • Abdualrhman Muzamil ( RespondTeam.com )
  • Harsh Joshi
  • Khun Myat
  • Mustafa Diaa (@c0braBaghdad1 )
  • Nyi Htet Aung
  • Tao SAUVAGE
  • Zika Ds
April 2019:
  • Aamir Usman Khan
  • Khun Myat
  • Ko Ko Naing
  • Mustafa Diaa ( @c0braBaghdad1 )
  • Nyi Htet Aung
  • Pranshu Tiwari
  • Tarun Mahour
  • Wai Yan Aung
  • Tao Sauvage, IOActive, Senior Security Consultant
March 2019:
  • Priyanshu Gupta
  • Wai Yan Aung
  • Talib Osmani
  • Javier Aguinaga
  • Chaoyi Lu
  • Resecurity International
February 2019:
  • Salman Sajid Khan
  • Tijo Davis
  • Roy Solberg
  • CodeBreaker of STARLabs
  • Ronnie
January 2019:
  • Mustafa Kemal Can
  • Jesus Arturo Espinoza Soto
  • Wai Yan Aung
  • JAIMEivanM mendoza ribera
  • Suraj Gourkar
  • Sabeer Bijapur
2018 ∇
December 2018:
  • Hamza Mandil
  • bharat
  • Mustafa Khan
  • AbdelRhman Adel
  • Mohammed Adam
  • Thejus Krishnan
November 2018:
  • Numan ÖZDEMİR
  • Hazem Osama
  • Pyae Phyoe Thu
  • Hein Thant Zin
  • Ram Makwana
  • Wai Yan Aung
October 2018:
  • Himanshu Rahi
  • Ashik S N
  • Dhiyaneshwaran
  • Wai Yan Aung
  • Pratik Raut
  • CYBERNETIV DIGITAL
  • Duda, Przemyslaw
September 2018:
  • Ruikai Liu
  • Fakhri Zulkifli
  • Matthew Cundari
  • Deepanshu Tyagi
  • Mayank
  • Baiqing Lyu (吕柏庆)
August 2018:
  • El-Staifi
  • Wai Yan Aung
  • Bill Ben Haim
  • Sumit Sahoo
  • Lakshay Gupta
  • tty0
July 2018:
  • Rick Ramgattie
  • Nishant Saurav
  • Mohammed Adel
  • Wai Yan Aung
  • Pethuraj M
June 2018:
  • Lawrence Amer
  • Alban Cenaj
  • Wai Yan Aung
May 2018:
  • Yeasir Arafat
  • Anil Tom
  • Sara Badran
April 2018:
  • Yonghui Han of Fortinet's FortiGuard Labs
  • Dmitriy Alekseev
  • Fish Getachew
  • Nathu Nandwani
  • Nicodemo Gawronski & Ana Maria Popescu @amiutza
  • Diego Juarez from Core Security Technologies for Elevation of Privilege vulnerability in Asus Aura Sync.
  • Mohamed A. Baset of Seekurity.com SAS de C.V.
March 2018:
  • Emad Abou Shanab
  • Konduru Jashwanth
  • Nikhil Srivastava
  • Dan Nino I. Fabro.
  • Kunal Bahl
February 2018:
  • HaoTian Xiang
  • Niv Levi
  • Chris Wood
  • Vasim Shaikh (India)
  • Wen Bin Kong
  • Florian Kunushevci
  • Pritesh Mistry
  • Ismail Tasdelen
January 2018:
  • Dipak Prajapati
  • Vasim Shaikh (India)
  • Akaash M. Sharma
  • Kushal Sharma
  • Adesh Nandkishor Kolte
  • Chirag Gupta
  • Osanda Malith Jayathissa (@OsandaMalith)
  • Chacko K Abraham
  • Suvadip Kar
  • Ankit Singh Nikhil Sahoo and Ipsita Subhadarshan Sahoo
  • Yassine Nafiai
  • Guy Arazi
2017 ∇
December 2017:
  • Blazej Adamczyk
  • Joaquim Espinhara
  • Beyond Security’s SecuriTeam Secure Disclosure program
  • David Maciejak of Fortinet's FortiGuard Labs
November 2017:
  • Ketankumar Godhani
  • Ankit Singh
  • Junaid Farhan
October 2017:
  • Daniel Diez
  • Sankalpa Nirmana
  • Vyshnav Vizz
September 2017:
  • Samet Şahin
  • Ranjeet Jaiswal
August 2017:
  • Yoko
  • Sreedeep Ck Alavil
April 2017:
  • Cool Alfaiz
  • Manav Infosec
  • Mohammad Abdullah
March 2017:
  • Cool Alfaiz
January 2017:
  • CDL
2016 ∇
December 2016:
  • Kishan Kumar
October 2016:
  • Yunus Yildirim
  • Muhammad Hammad
  • Chris
September 2016:
  • Steave Afters
  • Jhack

Contacting Us

If you have any inquiries, questions, comments or complaints about the security advisory page, Please feel free to contact security@asus.com.


All ASUS routers, launched since 2020 will received at least three years of security updates.