MrBruh's Epic Blog

ASUSpicious Flaw - Millions of Users’ Information Exposed Since 2022

Please note that it’s not particularly suspicious, it just made for a good play-on-words title.

Introduction

What do most people do when they’re mistreated by a multi-billion dollar company after reporting a zero-day RCE to them? Certainly not find another zero-day exploit, but that’s exactly what I ended up doing. Read part one of this series on ASUS here.

I had recently spent a lot of hours trawling through decompiled C/C++ code in part one so I wanted something a little easier to read. This meant looking for executables made using C# since its decompilation creates a near perfect replica of the original code including file, function and variable names.

ilspy.png

After running a bash script to search for .net executables using the file command, I made a shortlist of about 10 files that piqued my interest. After examining the source code of them I found two that looked interesting, AsusSSO.dll and AsusAPI.dll used in their MyAsus software.

file_command.png

Finding hard-coded credentials

When examining these I noticed they both contained encrypted hard coded values that were decrypted on the fly, and after isolating the decryption functions I asked ChatGPT to port it to Python so I could decrypt values independently of the DLL which ChatGPT managed to successfully replicate on its second attempt.

AsusAPI.dll encryption algorithm: AsusAPI.png AsusSSO.dll encryption algorithm: AsusSSO.png

After decrypting some of these values and reading over some of the functions using them I came to the conclusion that these were authorisation credentials and tokens for use with their API.

GetUserInfo.png

My main concern was that these encrypted credentials may have unnecessarily permissive scopes that could facilitate malicious use if put in the wrong hands. This turned out to be true as the hard coded credentials had administrator level / unrestricted permissions that could be abused to access the information of any ASUS account.

The Exploitable Endpoints

Here is a list of the different endpoints I found and what could be done with them if you had the hard coded credentials.

This could list the ticket ID, Name and Date of any support issues filed by email

This would let you upload a text or image attachment to any support ticket if you had the ticket ID.

This would let you create a new support ticket, which did not seem to do any server side validation on the content of it.

This retrieved the full details and conversation history of a support ticket via its ticket ID.

PoC:


This would presumably return a list of RMA tickets for a specified customer, I was unable to test this due to not having my own RMA ticket to check.

This would presumably return the full details of a RMA ticket similar to the support ticket API above.


This would return the internal ID of any user if you sent the endpoint their email.

This would return the full information of any user if you provided their user ID. This information includes peoples Full Names, Date of Birth, Phone Numbers and Full Addresses.

PoC:

Conclusion

After further research I concluded that this vulnerability has existed since August 2022 when MyAsus first released and there is a chance that it was being actively exploited due to this vulnerabilities simplicity. This likely affects millions of accounts including those who made ASUS accounts for other products such as the ROG forums.

As seen above, the data that can be compromised includes peoples names, phone numbers, date of birth, addresses, the contents of any support tickets and potentially peoples RMA requests.

At this point I finished writing up the PoC’s and sent it off to ASUS with a detailed report on the matter.

Reporting Timeline (DD/MM/YYYY)

Bug Bounty

As seen in part one of this blog, ASUS states that they do not offer bug bounties or even merch to security researchers.

I feel like I should point out that this behaviour is incredibly dangerous and may lead or has already lead to exploits not being reported or sold to threat actors due to there being next to no actual incentives for security researchers.

Almost everyone has their price, and for a lot of people 100-250k (Estimated black market price of the RCE in part 1) would make it hard to resist.

Fun Notes

Contact Me

If you have any questions you can contact me on Signal (preferred) @paul19.84 or via email contact [at] mrbruh.com. Emails are less likely to get a response unless you are a journalist.

Donations

If you want to buy me a coffee I welcome donations to my Monero wallet: 86kC5fcDybnGSUdYgDfWXm83XRBTtqRrGN26Pofrxq9nNM7EAw237yzX1se7fF7kQeKMxrEEDb1gQbZWvR3Sht1J1dZAhYu