PatchSiren cyber security CVE debrief
CVE-2017-5632 Asus CVE debrief
CVE-2017-5632 is a denial-of-service issue affecting ASUS RT-N56U firmware 3.0.0.4.374_979. According to the supplied NVD record, an attacker on the local network can trigger a crash of the device’s WAN connection by running an nmap -O command against the target IP, which can disconnect the router from the Internet.
- Vendor
- Asus
- Product
- CVE-2017-5632
- CVSS
- MEDIUM 6.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-30
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-30
- Advisory updated
- 2026-05-13
Who should care
ASUS RT-N56U owners and administrators, especially anyone running firmware 3.0.0.4.374_979 on networks where untrusted users or devices can reach the local LAN. Network defenders should care because the impact is service disruption rather than data theft, but it can still take connectivity offline.
Technical summary
The supplied record describes a local-area-network attack that causes the router’s WAN connection to crash when an nmap -O probe is directed at an affected device’s IP address. NVD assigns CVSS v3.0 AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, which aligns with an adjacent-network attack requiring no privileges and no user interaction, with high availability impact and no confidentiality or integrity impact. The vulnerable CPE entry in the supplied corpus is ASUS RT-N56U firmware 3.0.0.4.374_979.
Defensive priority
Medium. The issue is exploitable only from within the local network and is limited to denial of service, but it can immediately interrupt internet connectivity for affected devices.
Recommended defensive actions
- Confirm whether any ASUS RT-N56U devices are running firmware 3.0.0.4.374_979.
- Review the ASUS product security advisory linked in the source corpus for vendor guidance and remediation status.
- Restrict local-network access to trusted users and devices where practical.
- Segment guest, IoT, and unmanaged devices away from the router management and LAN plane.
- Monitor for unexpected WAN disconnects or repeated local scanning activity against router IP addresses.
- If the device is still in use, apply any vendor-recommended firmware update or mitigation from ASUS before restoring normal exposure.
Evidence notes
This debrief is based only on the supplied NVD-derived corpus and linked references. The corpus states: affected product ASUS RT-N56U firmware 3.0.0.4.374_979; attack vector from within the local area network; impact is WAN connection crash and internet disconnection; CVSS v3.0 vector AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H; and references to a SecurityFocus BID entry and an ASUS product security advisory. NVD also marks the vulnerability status as Modified in the provided record.
Official resources
-
CVE-2017-5632 CVE record
CVE.org
-
CVE-2017-5632 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
CVE-2017-5632 was published on 2017-01-30. The supplied source record was modified on 2026-05-13. Those dates are retained here for timeline context only and do not indicate a new vulnerability date.