Friday, March 29, 2024

MikroTik RouterOS Vulnerability Allows Hackers to Perform DOS Attacks

A Serious vulnerability that discovered in MikroTik RouterOS allows attackers to perform DoS attack on the vulnerable router that causes the device to reboot.

MikroTik provides hardware and software for Internet connectivity around the world and they also created a RouterOS software.

This vulnerability allows the watchdog timer to reboots the router that causes device overloaded and eventually stop responding, the issue was addressed and fixed.

But another issue caused the memory to be filled because IPv6 route cache size could be bigger than the available RAM.

This flaw also was fixed by introducing automatic cache size calculation based on available memory, MikroTik said.

MikroTik patches flaw CVE-2018-19299, but an unpatched MikroTik router that routes the traffic via IPV6 will be affected.

It allows an attacker to take down the MikroTik router and exhausting the RAM by routes the malicious traffic via IPV6.

According to MikroTik, Both fixes are released already in RouterOS versions that were published April 2019 (all release chains: RouterOS v6.44.2, RouterOS v6.45beta23, and RouterOS v6.43.14). 

This fixes working in the following way,

  • ipv6 – fixed soft lockup when forwarding IPv6 packets
  • ipv6 – fixed soft lockup when processing large IPv6 Neighbor table
  • ipv6 – adjust IPv6 route cache max size based on total RAM memory

it means that the current fixes possibly apply to the current version (v6.44.2) and long term (v6.43.14) release versions and this fixes only for the device that contains more than RAM 64 MB size.

So if the routers with RouterOS 6.44.2 do not crash if they have enough memory.

MikroTik advised to Upgrade to any RouterOS version released after April 1st, 2019.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Hackers Hijacked 7,500+ MikroTik Routers and Redirecting User Traffic to Attackers

Hackers Attack Over 200,000 MikroTik Routers & Infected with Mass Coinhive Cryptojacking Malware

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles