Code Defence Cyber security

CISA Adds ASUS Embedded Vulnerability to KEV Following Active Exploitation

CISA has added a critical ASUS embedded device vulnerability to its Known Exploited Vulnerabilities (KEV) catalog. The flaw involves malicious code embedded in firmware that allows unauthenticated remote execution, primarily targeting small office/home office (SOHO) routers used by remote workers.

Business Impact

With the permanence of hybrid work, compromised home routers are now the “backdoor” into the corporate network. Attackers can use these devices to sniff corporate traffic, capture VPN credentials, and launch attacks against internal corporate assets from a “trusted” home IP.

Why It Happened

The vulnerability stems from insecure firmware update mechanisms that allowed attackers to inject malicious code into the legitimate update stream, a classic supply chain compromise for hardware.

Recommended Executive Action

Update your remote work policy to mandate corporate-managed hardware for home offices or require a “Zero Trust” architecture that treats the home network as inherently untrusted, regardless of the router’s brand.

Hashtags: #CISA #ASUS #IoT #SOHO #Vulnerability #KEV #RemoteWork #SupplyChain #InfoSec

Scroll to Top

Review My Order

0

Subtotal