Denial of service in MikroTik RouterOS



Published: 2020-09-15 | Updated: 2020-09-21
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2020-11881
CWE-ID CWE-129
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
MikroTik RouterOS
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor MikroTik

Security Bulletin

This security bulletin contains information about 1 vulnerabilities.

Updated 21.09.2020

Added fixed version.

1) Improper Validation of Array Index

EUVDB-ID: #VU46736

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-11881

CWE-ID: CWE-129 - Improper Validation of Array Index

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to perform denial of service attack.

The vulnerability exists due to improper validation of array index when processing setup-requests in a built-in SMB server. A remote non-authenticated attacker can send specially crafted setup-request packets and crash the SMB server.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

MikroTik RouterOS: 6.41.3 - 6.41.4, 6.42 - 6.42.12, 6.43 - 6.43.16, 6.44 - 6.44.6, 6.45 - 6.45.9, 6.46 - 6.46.7, 6.47 - 6.47.3


CPE2.3 External links

http://github.com/botlabsDev/CVE-2020-11881

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###