ASUS.Remote.Console.Dpcproxy.Buffer.Overflow

description-logoDescription

This indicates an attempt to exploit a buffer overflow vulnerability in Asus Remote Console DPC Proxy.
The vulnerability is caused by an error that occurs when the vulnerable software receives requests on TCP port 623, which are longer than anticipated. It allows a remote attacker to execute arbitrary code by sending specially crafted packets.

affected-products-logoAffected Products

Asus Remote Console 2.0.0.24 and later versions.

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Currently we are not aware of any vendor supplied patch for this issue. We recommend the use of a firewall tool to block ingress traffic on TCP port 623.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)