ASUS.Remote.Console.Dpcproxy.Buffer.Overflow
Description
This indicates an attempt to exploit a buffer overflow vulnerability in Asus Remote Console DPC Proxy.
The vulnerability is caused by an error that occurs when the vulnerable software receives requests on TCP port 623, which are longer than anticipated. It allows a remote attacker to execute arbitrary code by sending specially crafted packets.
Affected Products
Asus Remote Console 2.0.0.24 and later versions.
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Currently we are not aware of any vendor supplied patch for this issue. We recommend the use of a firewall tool to block ingress traffic on TCP port 623.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |