Security News > 2018 > October > MikroTik routers with default credentials can be easily compromised

MikroTik routers with default credentials can be easily compromised
2018-10-08 10:23

If you own a MikroTik router and you haven’t updated its RouterOS in the last month, you should do so now: Tenable Research has released details about four vulnerabilities they found in the OS, including an authenticated remote code execution flaw that can be leveraged against routers with default credentials. About MikroTik MikroTik is headquartered in Riga, Latvia, and routers they manufacture are used by ISPs providers across the world. “Based on Shodan analysis, there … More → The post MikroTik routers with default credentials can be easily compromised appeared first on Help Net Security.


News URL

http://feedproxy.google.com/~r/HelpNetSecurity/~3/5tzgoNvLnpc/

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Mikrotik 30 1 59 16 4 80