PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-5632 Asus CVE debrief

CVE-2017-5632 is a denial-of-service issue affecting ASUS RT-N56U firmware 3.0.0.4.374_979. According to the supplied NVD record, an attacker on the local network can trigger a crash of the device’s WAN connection by running an nmap -O command against the target IP, which can disconnect the router from the Internet.

Vendor
Asus
Product
CVE-2017-5632
CVSS
MEDIUM 6.5
CISA KEV
Not listed in stored evidence
Original CVE published
2017-01-30
Original CVE updated
2026-05-13
Advisory published
2017-01-30
Advisory updated
2026-05-13

Who should care

ASUS RT-N56U owners and administrators, especially anyone running firmware 3.0.0.4.374_979 on networks where untrusted users or devices can reach the local LAN. Network defenders should care because the impact is service disruption rather than data theft, but it can still take connectivity offline.

Technical summary

The supplied record describes a local-area-network attack that causes the router’s WAN connection to crash when an nmap -O probe is directed at an affected device’s IP address. NVD assigns CVSS v3.0 AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, which aligns with an adjacent-network attack requiring no privileges and no user interaction, with high availability impact and no confidentiality or integrity impact. The vulnerable CPE entry in the supplied corpus is ASUS RT-N56U firmware 3.0.0.4.374_979.

Defensive priority

Medium. The issue is exploitable only from within the local network and is limited to denial of service, but it can immediately interrupt internet connectivity for affected devices.

Recommended defensive actions

  • Confirm whether any ASUS RT-N56U devices are running firmware 3.0.0.4.374_979.
  • Review the ASUS product security advisory linked in the source corpus for vendor guidance and remediation status.
  • Restrict local-network access to trusted users and devices where practical.
  • Segment guest, IoT, and unmanaged devices away from the router management and LAN plane.
  • Monitor for unexpected WAN disconnects or repeated local scanning activity against router IP addresses.
  • If the device is still in use, apply any vendor-recommended firmware update or mitigation from ASUS before restoring normal exposure.

Evidence notes

This debrief is based only on the supplied NVD-derived corpus and linked references. The corpus states: affected product ASUS RT-N56U firmware 3.0.0.4.374_979; attack vector from within the local area network; impact is WAN connection crash and internet disconnection; CVSS v3.0 vector AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H; and references to a SecurityFocus BID entry and an ASUS product security advisory. NVD also marks the vulnerability status as Modified in the provided record.

Official resources

CVE-2017-5632 was published on 2017-01-30. The supplied source record was modified on 2026-05-13. Those dates are retained here for timeline context only and do not indicate a new vulnerability date.