CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-12912

High Severity
SVRS
66/100

CVSSv3
7.2/10

EPSS
0.00123/1

CVE-2024-12912 is an improper input insertion vulnerability in ASUS AiCloud on specific router models. This flaw can allow attackers to execute arbitrary commands on the affected system. The ASUS Security Advisory provides further details on this vulnerability. While the CVSS score is 7.2, the SOCRadar Vulnerability Risk Score (SVRS) is 66, indicating a moderate level of risk requiring prompt attention. Exploitation of CVE-2024-12912 could lead to complete system compromise, potentially enabling data theft, malware deployment, or denial-of-service attacks. Router security is critical, and users should apply the necessary patches or mitigation steps immediately upon release to prevent potential exploitation. Given the "In The Wild" tag, this vulnerability is actively being exploited, increasing the urgency for patching.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:H
UI:N
S:U
C:H
I:H
A:H
2025-01-02

2025-01-06
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-12912 is an improper input insertion vulnerability affecting certain ASUS router models with AiCloud enabled. This vulnerability could allow attackers to execute arbitrary commands on the affected routers, potentially leading to full system compromise. While the CVSS score is 7.2, indicating a high severity, the SOCRadar Vulnerability Risk Score (SVRS) is 36, suggesting a moderate risk level. This is likely due to the limited availability of exploits and the fact that this vulnerability is not actively being exploited in the wild. However, the "In The Wild" tag suggests that this vulnerability has been exploited in real-world attacks, so it should still be addressed promptly.

Key Insights

  • Impact: Successful exploitation of this vulnerability could allow attackers to execute arbitrary commands on the affected router, potentially leading to full system compromise. This could allow attackers to steal sensitive information, install malware, and launch further attacks against the network.
  • Exploitation: While active exploits have not been published yet, the "In The Wild" tag suggests that attackers are already using this vulnerability. This makes it critical to patch affected devices immediately.
  • Affected Devices: This vulnerability affects certain ASUS router models with AiCloud enabled. Users should consult the ASUS Security Advisory for a complete list of vulnerable models.
  • Potential Threat Actors: Due to the "In The Wild" status, this vulnerability is likely being exploited by unknown threat actors, possibly including financially motivated hackers or advanced persistent threats.

Mitigation Strategies

  • Update Router Firmware: The most effective mitigation strategy is to update the router firmware to the latest version. This will patch the vulnerability and prevent attackers from exploiting it.
  • Disable AiCloud: If possible, disabling AiCloud on the router can also help reduce the risk of exploitation.
  • Change Default Credentials: Ensure that all default passwords and usernames have been changed to strong, unique credentials. This can prevent attackers from accessing the router using default credentials.
  • Implement Network Segmentation: Implementing network segmentation can help limit the damage if one device is compromised. By isolating the router from other critical systems, attackers will be less likely to gain access to sensitive data or launch further attacks.

Additional Information

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

Vulnerabilidades críticas em roteadores da ASUS
Da Redação2025-01-07
Vulnerabilidades críticas em roteadores da ASUS | A fabricante de hardware ASUS informou ao mercado a existência de vulnerabilidades críticas que afetam roteadores da sua marca com a função AiCloud. As falhas – CVE-2024-12912 e CVE-2024-13062 – permitem que invasores executem comandos remotamente, devido à validação inadequada de entradas no firmware. Ambas foram classificadas como de alta gravidade, com uma pontuação CVSS […] Fonte
cisoadvisor.com.br
rss
forum
news
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]
Ajit Jasrotia2025-01-06
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan] | Every tap, click, and swipe we make online shapes our digital lives, but it also opens doors—some we never meant to unlock. Extensions we trust, assistants we rely on, and even the codes we scan are turning into tools for attackers. The line between convenience and vulnerability has never been thinner. This week, we dive […] The post ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]
allhackernews.com
rss
forum
news
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan] - The Hacker News
2025-01-06
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan] - The Hacker News | News Content: Every tap, click, and swipe we make online shapes our digital lives, but it also opens doors—some we never meant to unlock. Extensions we trust, assistants we rely on, and even the codes we scan are turning into tools for attackers. The line between convenience and vulnerability has never been thinner. This week, we dive into the hidden risks, surprising loopholes, and the clever tricks cybercriminals are using to outsmart the systems we depend on. Stay with us as we unpack what's
google.com
rss
forum
news
CVE-2024-12912 | ASUS Router AiCloud input validation
vuldb.com2025-01-02
CVE-2024-12912 | ASUS Router AiCloud input validation | A vulnerability was found in ASUS Router 3.0.0.4_382 series/3.0.0.4_386 series/3.0.0.4_388 series/3.0.0.6_102 series. It has been declared as critical. This vulnerability affects unknown code of the component AiCloud. The manipulation leads to improper input validation. This vulnerability was named CVE-2024-12912. The attack can be initiated remotely. There is no exploit available.
vuldb.com
rss
forum
news

Social Media

🚨Alert🚨 CVE-2024-12912&CVE-2024-13062 : Injection and execution vulnerabilities in certain ASUS router firmware series. 📊 1.2m+ Services are found on https://t.co/ysWb28BTvF yearly. 🔗Hunter Link: https://t.co/jX5AV6gjqM 👇Query HUNTER :/product.name="ASUS AiCloud" FOFA : https://t.co/MWz1QzbQbj
0
2
4
Weekly Vulnerabilities Update 1) Critical Vulnerabilities Found in ASUS Routers ASUS has issued a security advisory regarding two critical vulnerabilities, CVE-2024-12912 and CVE-2024-13062, affecting several router models. These flaws could allow attackers to execute arbitrary
1
0
0
RT @Dinosn: CVE-2024-12912 & CVE-2024-13062: ASUS Routers at Risk https://t.co/YAHqHEBbF7 iocs: https://securityonline.info/cve-2024-12912-cve-2024-13062-asus-routers-at-risk/
0
4
0
#Vulnerability #AiCloud CVE-2024-12912 & CVE-2024-13062: ASUS Routers at Risk https://t.co/OtQLX6vrwt
0
0
0
CVE-2024-12912 & CVE-2024-13062: ASUS Routers at Risk Take action to secure your ASUS router! Find out about the vulnerabilities and why it's crucial to update your firmware https://t.co/rxVrc1zKSC
0
0
0
🗣 CVE-2024-12912 & CVE-2024-13062: ASUS Routers at Risk https://t.co/mHsQoSIbjp
0
0
0
CVE-2024-12912 An improper input insertion vulnerability in AiCloud on certain router models may lead to arbitrary command execution. Refer to the '01/02/2025 ASUS Router AiCloud vu… https://t.co/L6TC4Y6BTP
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
54BF65A7-A193-42D2-B1BA-8E150D3C35E1https://www.asus.com/content/asus-product-security-advisory/

CWE Details

CWE IDCWE NameDescription
CWE-77Improper Neutralization of Special Elements used in a Command ('Command Injection')The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
CWE-20Improper Input ValidationThe product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence