CVE-2023-26602
📋 TL;DR
This vulnerability in ASUS ASMB8 iKVM firmware allows remote attackers to execute arbitrary code via SNMP commands that create malicious extensions. Attackers can achieve remote root access by using snmpset with NET-SNMP-EXTEND-MIB to execute shell commands. Organizations using ASUS ASMB8 iKVM devices with vulnerable firmware versions are affected.
💻 Affected Systems
- ASUS ASMB8 iKVM
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with remote root access, allowing attackers to install malware, exfiltrate data, pivot to other systems, and maintain persistent access.
Likely Case
Remote code execution leading to system takeover, credential theft, and lateral movement within the network.
If Mitigated
Limited impact if SNMP access is properly restricted and network segmentation isolates iKVM devices.
🎯 Exploit Status
Public exploit code available in multiple references. Attack requires SNMP access but no authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 1.14.51
Vendor Advisory: https://www.asus.com/support/
Restart Required: Yes
Instructions:
1. Check current firmware version via iKVM web interface. 2. Download latest firmware from ASUS support site. 3. Upload and apply firmware update through web interface. 4. Reboot device after update completes.
🔧 Temporary Workarounds
Disable SNMP Service
allDisable SNMP service on ASMB8 iKVM devices to prevent exploitation.
Access iKVM web interface > Network > SNMP > Disable SNMP service
Restrict SNMP Access
linuxConfigure firewall rules to restrict SNMP access to trusted management networks only.
iptables -A INPUT -p udp --dport 161 -s TRUSTED_NETWORK -j ACCEPT
iptables -A INPUT -p udp --dport 161 -j DROP
🧯 If You Can't Patch
- Isolate ASMB8 iKVM devices on separate VLAN with strict firewall rules blocking SNMP from untrusted networks.
- Implement network monitoring for SNMP traffic to/from iKVM devices and alert on suspicious SNMP commands.
🔍 How to Verify
Check if Vulnerable:
Check firmware version in iKVM web interface under System Information. If version is 1.14.51 or earlier, device is vulnerable.
Check Version:
snmpwalk -v2c -c public DEVICE_IP .1.3.6.1.2.1.1.1 (check system description for version)
Verify Fix Applied:
Verify firmware version shows higher than 1.14.51 after update. Test SNMP functionality to ensure service still works if needed.
📡 Detection & Monitoring
Log Indicators:
- SNMP SET requests to NET-SNMP-EXTEND-MIB
- Unusual process execution from SNMP service
- Failed SNMP authentication attempts
Network Indicators:
- SNMP traffic to port 161/UDP from unexpected sources
- SNMP SET operations with shell commands in payload
SIEM Query:
source_port=161 AND (protocol=udp) AND (payload CONTAINS "NET-SNMP-EXTEND-MIB" OR payload CONTAINS "/bin/sh")
🔗 References
- http://packetstormsecurity.com/files/171137/ASUS-ASMB8-iKVM-1.14.51-SNMP-Remote-Root.html
- http://seclists.org/fulldisclosure/2023/Feb/15
- https://nwsec.de/NWSSA-002-2023.txt
- http://packetstormsecurity.com/files/171137/ASUS-ASMB8-iKVM-1.14.51-SNMP-Remote-Root.html
- http://seclists.org/fulldisclosure/2023/Feb/15
- https://nwsec.de/NWSSA-002-2023.txt