Multiple vulnerabilities in MikroTik RouterOS



Published: 2021-05-10 | Updated: 2021-06-01
Risk Low
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2020-20214
CVE-2020-20222
CVE-2020-20236
CVE-2020-20237
CWE-ID CWE-617
CWE-476
CWE-119
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
MikroTik RouterOS
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor MikroTik

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

Updated 01.06.2021

Added fixed version.

1) Reachable Assertion

EUVDB-ID: #VU52987

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-20214

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion within the btest process. A remote authenticated user can send specially crafted packet to the system and trigger an assertion failure.

Mitigation

Install update from vendor's website.

Vulnerable software versions

MikroTik RouterOS: 6.40 - 6.40.9, 6.41 - 6.41.4, 6.42 - 6.42.12, 6.43 - 6.43.16, 6.44 - 6.44.6, 6.45 - 6.45.9, 6.46 - 6.46.8, 6.47 - 6.47.9, 6.48 - 6.48.2


CPE2.3 External links

http://seclists.org/fulldisclosure/2021/May/15

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

2) NULL pointer dereference

EUVDB-ID: #VU52988

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-20222

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the sniffer process. A remote authenticated user can pass specially crafted data to the system and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

MikroTik RouterOS: 6.40 - 6.40.9, 6.41 - 6.41.4, 6.42 - 6.42.12, 6.43 - 6.43.16, 6.44 - 6.44.6, 6.45 - 6.45.9, 6.46 - 6.46.8, 6.47 - 6.47.9, 6.48 - 6.48.2


CPE2.3 External links

http://seclists.org/fulldisclosure/2021/May/15

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

3) Buffer overflow

EUVDB-ID: #VU52989

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-20236

CWE-ID: CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the sniffer process. A remote authenticated user can pass specially crafted data to the system, trigger invalid memory access and crash the affected process.

Mitigation

Install update from vendor's website.

Vulnerable software versions

MikroTik RouterOS: 6.46.3 - 6.46.8, 6.47 - 6.47.9, 6.48 - 6.48.2


CPE2.3 External links

http://seclists.org/fulldisclosure/2021/May/15

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

4) Buffer overflow

EUVDB-ID: #VU52990

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-20237

CWE-ID: CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the sniffer process. A remote authenticated user can pass specially crafted data to the system, trigger invalid memory access and crash the affected process.

Mitigation

Install update from vendor's website.

Vulnerable software versions

MikroTik RouterOS: 6.46.3 - 6.46.8, 6.47 - 6.47.9, 6.48 - 6.48.2


CPE2.3 External links

http://seclists.org/fulldisclosure/2021/May/15

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###