CVE-2022-26672

7.3 HIGH

📋 TL;DR

ASUS WebStorage contains a hardcoded API token in its source code, allowing unauthenticated remote attackers to connect to the server and attempt logins to user accounts. Successful exploitation enables attackers to access, modify, or delete user account information. This affects all users of vulnerable ASUS WebStorage installations.

💻 Affected Systems

Products:
  • ASUS WebStorage
Versions: All versions prior to patched version
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable due to hardcoded credentials in the application source code.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain unauthorized access to all user accounts, leading to complete data breach, account takeover, and potential lateral movement within the system.

🟠

Likely Case

Attackers compromise individual user accounts to steal personal data, modify account settings, or delete user information.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to isolated user account compromises rather than system-wide breaches.

🌐 Internet-Facing: HIGH - The vulnerability allows unauthenticated remote exploitation, making internet-facing instances particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal instances are still vulnerable but require network access; risk depends on internal network security controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only the hardcoded token and basic API knowledge; no advanced skills needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check ASUS advisory for specific patched version

Vendor Advisory: https://www.twcert.org.tw/tw/cp-132-6041-7bd67-1.html

Restart Required: Yes

Instructions:

1. Check ASUS advisory for latest patched version. 2. Update ASUS WebStorage to the patched version. 3. Restart the service. 4. Rotate all user credentials as precaution.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to ASUS WebStorage to trusted IPs only

Use firewall rules to limit inbound connections to specific IP ranges

API Token Rotation

all

Manually replace hardcoded API token with new secure token

Modify application source code to replace hardcoded token with secure random token

🧯 If You Can't Patch

  • Disable ASUS WebStorage service until patching is possible
  • Implement strict network access controls and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Inspect application source code for hardcoded API tokens or attempt authentication using known hardcoded credentials

Check Version:

Check ASUS WebStorage application settings or documentation for version information

Verify Fix Applied:

Verify application version matches patched version and test that hardcoded token no longer works for authentication

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts from single source
  • Successful logins using API token from unexpected sources
  • Unusual account access patterns

Network Indicators:

  • API calls using hardcoded token from unauthorized IPs
  • Unusual authentication traffic patterns

SIEM Query:

source_ip=* AND (event_type="authentication" AND token="hardcoded_token_value") OR (failed_logins > threshold)

🔗 References

📤 Share & Export