CISA has added a critical ASUS embedded device vulnerability to its Known Exploited Vulnerabilities (KEV) catalog. The flaw involves malicious code embedded in firmware that allows unauthenticated remote execution, primarily targeting small office/home office (SOHO) routers used by remote workers.
Business Impact
With the permanence of hybrid work, compromised home routers are now the “backdoor” into the corporate network. Attackers can use these devices to sniff corporate traffic, capture VPN credentials, and launch attacks against internal corporate assets from a “trusted” home IP.
Why It Happened
The vulnerability stems from insecure firmware update mechanisms that allowed attackers to inject malicious code into the legitimate update stream, a classic supply chain compromise for hardware.
Recommended Executive Action
Update your remote work policy to mandate corporate-managed hardware for home offices or require a “Zero Trust” architecture that treats the home network as inherently untrusted, regardless of the router’s brand.
Hashtags: #CISA #ASUS #IoT #SOHO #Vulnerability #KEV #RemoteWork #SupplyChain #InfoSec
