Vulnerabilities > CVE-2018-1156 - Out-of-bounds Write vulnerability in Mikrotik Routeros
Attack vector
NETWORK Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to stack buffer overflow through the license upgrade interface. This vulnerability could theoretically allow a remote authenticated attacker execute arbitrary code on the system.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family | Misc. |
NASL id | MIKROTIK_AUG_2018.NASL |
description | According to its self-reported version, the remote networking device is running a version of MikroTik prior to 6.40.9, 6.41.x < 6.42.7, or 6.43. It, therefore, vulnerable to multiple vulnerabilities. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 112114 |
published | 2018-08-24 |
reporter | This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/112114 |
title | MikroTik RouterOS < 6.40.9 / 6.42.7 / 6.43 multiple vulnerabilities. |
code |
|
The Hacker News
id | THN:15F5633BC0BA0C82579744CCACA99558 |
last seen | 2018-10-08 |
modified | 2018-10-08 |
published | 2018-10-08 |
reporter | The Hacker News |
source | https://thehackernews.com/2018/10/router-hacking-exploit.html |
title | New Exploit for MikroTik Router WinBox Vulnerability Gives Full Root Access |
References
- https://mikrotik.com/download/changelogs
- https://mikrotik.com/download/changelogs
- https://mikrotik.com/download/changelogs/bugfix-release-tree
- https://mikrotik.com/download/changelogs/bugfix-release-tree
- https://www.tenable.com/security/research/tra-2018-21
- https://www.tenable.com/security/research/tra-2018-21