Risk | High |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2019-3976 CVE-2019-3977 CVE-2019-3978 CVE-2019-3979 |
CWE-ID | CWE-22 CWE-345 CWE-732 CWE-20 |
Exploitation vector | Network |
Public exploit |
Public exploit code for vulnerability #1 is available. Public exploit code for vulnerability #3 is available. |
Vulnerable software Subscribe |
MikroTik RouterOS Hardware solutions / Routers & switches, VoIP, GSM, etc |
Vendor | MikroTik |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU22424
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2019-3976
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in the filenames of the packages. A remote attacker can trick the victim into installing an updated with a specially crafted name and enable developer shell.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMikroTik RouterOS: 6.41.1 - 6.45.6
Fixed software versionsCPE2.3 External links
http://mikrotik.com/download/changelogs#6.45.7
http://www.tenable.com/security/research/tra-2019-46
http://github.com/tenable/routeros/tree/master/option_npk/
Q & A
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU22425
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2019-3977
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to software does not validate origin of the upgrade packages when using autoupgrade feature. A remote attacker can trick the victim into downloading and installing an old version of RouterOS and reset passwords of all system users.
Install updates from vendor's website.
Vulnerable software versionsMikroTik RouterOS: 6.44.1 - 6.45.6
Fixed software versionsCPE2.3 External links
http://mikrotik.com/download/changelogs#6.45.7
http://www.tenable.com/security/research/tra-2019-46
Q & A
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU22426
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2019-3978
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to perform DNS cache poisoning attacks.
The vulnerability exists due to RouterOS allows a remote attacker to initiate DNS queries via port 8291/TCP. A remote attacker can force the router to send DNS requests to an attacker-contorted server and poison router's DNS cache.
Install updates from vendor's website.
Vulnerable software versionsMikroTik RouterOS: 6.44.1 - 6.45.6
Fixed software versionsCPE2.3 External links
http://mikrotik.com/download/changelogs#6.45.7
http://www.tenable.com/security/research/tra-2019-46
Q & A
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU22427
Risk: High
CVSSv3.1:
CVE-ID: CVE-2019-3979
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to poison DNS cache.
The vulnerability exists due to insufficient validation of DNS responses, returned by the DNS server. A remote attacker can force the router to make a DNS request to a malicious DNS server and add DNS "A" records for arbitrary domain name to the router's DNS cache. As a result, a remote attacker can force the RouterOS to return incorrect information for DNS requests for arbitrary domain name and redirect all user's traffic to a malicious server.
Install updates from vendor's website.
Vulnerable software versionsMikroTik RouterOS: 6.44 - 6.45.6
Fixed software versionsCPE2.3 External links
http://mikrotik.com/download/changelogs#6.45.7
http://www.tenable.com/security/research/tra-2019-46
Q & A
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?