New MikroTik Router Vulnerabilities Winbox Gives Full Root Access exploit CVE



New MikroTik Router Vulnerabilities Winbox Gives Full Root Access exploit CVE

New MikroTik Router Vulnerabilities CVE Found
Besides this, Tenable Research also disclosed additional MikroTik RouterOS vulnerabilities, including:
CVE-2018-1156—A stack buffer overflow flaw that could allow an authenticated remote code execution, allowing attackers to gain full system access and access to any internal system that uses the router.
CVE-2018-1157—A file upload memory exhaustion flaw that allows an authenticated remote attacker to crash the HTTP server.
CVE-2018-1159—A www memory corruption flaw that could crash the HTTP server by rapidly authenticating and disconnecting.
CVE-2018-1158—A recursive parsing stack exhaustion issue that could crash the HTTP server via recursive parsing of JSON.

The vulnerabilities impact MikroTik RouterOS firmware versions before 6.42.7 and 6.40.9.
Tenable Research reported the issues to MikroTik in May, and the company addressed the vulnerabilities by releasing its RouterOS versions 6.40.9, 6.42.7 and 6.43 in August. While all the vulnerabilities were patched over a month ago, a recent scan by Tenable Research revealed that 70 percent of routers (which equals to 200,000) are still vulnerable to attack.

Details: CVE-2017-8338
A vulnerability in MikroTik Version 6.38.5 could allow an unauthenticated remote attacker to exhaust all available CPU via a flood of UDP packets on port 500 (used for L2TP over IPsec), preventing the affected router from accepting new connections; all devices will be disconnected from the router and all logs removed automatically. Vulnerability

Details: CVE-2018-7445
A buffer overflow was found in the MikroTik RouterOS SMB service when processing NetBIOS session request messages. Remote attackers with access to the service can exploit this vulnerability and gain code execution on the system. The overflow occurs before authentication takes place, so it is possible for an unauthenticated remote attacker to exploit it. All architectures and all devices running RouterOS before versions 6.41.3/6.42rc27 are vulnerable. Vulnerability
Details: CVE-2017-7285

A vulnerability in the network stack of MikroTik Version 6.38.5 released 2017-03-09 could allow an unauthenticated remote attacker to exhaust all available CPU via a flood of TCP RST packets, preventing the affected router from accepting new TCP connections. Vulnerability
Details: CVE-2018-10070

A vulnerability in MikroTik version 6.41.2 could allow an unauthenticated remote attacker to exhaust all available RAM by sending a crafted FTP request on port 21 that begins with many "\0" characters, preventing the affected router from accepting new FTP connections. The router will be reboot after 10 minutes, logging a router was rebooted without proper shutdown message.
Details: CVE-2018-7745

A buffer overflow was found in the MikroTik RouterOS SMB service when processing NetBIOS session request message, Remote attackers with access to the service can exploit this vulnerability and gain code execution on the system. The overflow occurs before authentication taker place, so it is possible for an unauthenticated remote attacker to exploit it. All architecture and all devices running RouterOS before version 6.41/6.4rc27 are vulnerable.

Details: CVE-2018-10066
An issue was discovered in MikroTik RouterOS 6.41.4. Missing OpenVPN server certificate verification allows a remote unauthenticated attacker capable of intercepting client traffic to act as a malicious OpenVPN server. This may allow the attacker to gain access to the client's internal network (for example, at site-to-site tunnels).


Product Type

Share this

Related Posts

Previous
Next Post »