MikroTik RouterOS Vulnerability Allows Hackers to Perform DOS Attacks

A Serious vulnerability that discovered in MikroTik RouterOS allows attackers to perform DoS attack on the vulnerable router that causes the device to reboot.

MikroTik provides hardware and software for Internet connectivity around the world and they also created a RouterOS software.

This vulnerability allows the watchdog timer to reboots the router that causes device overloaded and eventually stop responding, the issue was addressed and fixed.

But another issue caused the memory to be filled because IPv6 route cache size could be bigger than the available RAM.

This flaw also was fixed by introducing automatic cache size calculation based on available memory, MikroTik said.

MikroTik patches flaw CVE-2018-19299, but an unpatched MikroTik router that routes the traffic via IPV6 will be affected.

It allows an attacker to take down the MikroTik router and exhausting the RAM by routes the malicious traffic via IPV6.

According to MikroTik, Both fixes are released already in RouterOS versions that were published April 2019 (all release chains: RouterOS v6.44.2, RouterOS v6.45beta23, and RouterOS v6.43.14). 

This fixes working in the following way,

  • ipv6 – fixed soft lockup when forwarding IPv6 packets
  • ipv6 – fixed soft lockup when processing large IPv6 Neighbor table
  • ipv6 – adjust IPv6 route cache max size based on total RAM memory

it means that the current fixes possibly apply to the current version (v6.44.2) and long term (v6.43.14) release versions and this fixes only for the device that contains more than RAM 64 MB size.

So if the routers with RouterOS 6.44.2 do not crash if they have enough memory.

MikroTik advised to Upgrade to any RouterOS version released after April 1st, 2019.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Hackers Hijacked 7,500+ MikroTik Routers and Redirecting User Traffic to Attackers

Hackers Attack Over 200,000 MikroTik Routers & Infected with Mass Coinhive Cryptojacking Malware

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments

A startling discovery by BeyondTrust researchers has unveiled a critical vulnerability in Microsoft Entra ID…

19 hours ago

Threat Actors Exploit Google Apps Script to Host Phishing Sites

The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages Google…

20 hours ago

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials

Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated by…

20 hours ago

Beware: Weaponized AI Tool Installers Infect Devices with Ransomware

Cisco Talos has uncovered a series of malicious threats masquerading as legitimate AI tool installers,…

21 hours ago

Pure Crypter Uses Multiple Evasion Methods to Bypass Windows 11 24H2 Security Features

Pure Crypter, a well-known malware-as-a-service (MaaS) loader, has been recognized as a crucial tool for…

21 hours ago

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges

A recent discovery by security researchers at BeyondTrust has revealed a critical, yet by-design, security…

21 hours ago