MikroTik RouterOS Vulnerability Allows Hackers to Perform DOS Attacks

A Serious vulnerability that discovered in MikroTik RouterOS allows attackers to perform DoS attack on the vulnerable router that causes the device to reboot.

MikroTik provides hardware and software for Internet connectivity around the world and they also created a RouterOS software.

This vulnerability allows the watchdog timer to reboots the router that causes device overloaded and eventually stop responding, the issue was addressed and fixed.

But another issue caused the memory to be filled because IPv6 route cache size could be bigger than the available RAM.

This flaw also was fixed by introducing automatic cache size calculation based on available memory, MikroTik said.

MikroTik patches flaw CVE-2018-19299, but an unpatched MikroTik router that routes the traffic via IPV6 will be affected.

It allows an attacker to take down the MikroTik router and exhausting the RAM by routes the malicious traffic via IPV6.

According to MikroTik, Both fixes are released already in RouterOS versions that were published April 2019 (all release chains: RouterOS v6.44.2, RouterOS v6.45beta23, and RouterOS v6.43.14). 

This fixes working in the following way,

  • ipv6 – fixed soft lockup when forwarding IPv6 packets
  • ipv6 – fixed soft lockup when processing large IPv6 Neighbor table
  • ipv6 – adjust IPv6 route cache max size based on total RAM memory

it means that the current fixes possibly apply to the current version (v6.44.2) and long term (v6.43.14) release versions and this fixes only for the device that contains more than RAM 64 MB size.

So if the routers with RouterOS 6.44.2 do not crash if they have enough memory.

MikroTik advised to Upgrade to any RouterOS version released after April 1st, 2019.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Hackers Hijacked 7,500+ MikroTik Routers and Redirecting User Traffic to Attackers

Hackers Attack Over 200,000 MikroTik Routers & Infected with Mass Coinhive Cryptojacking Malware

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Beware Of Weaponized Air Force invitation PDF Targeting Indian Defense And Energy Sectors

EclecticIQ cybersecurity researchers have uncovered a cyberespionage operation dubbed "Operation FlightNight" targeting Indian government entities and energy companies.  The attackers,…

4 hours ago

WarzoneRAT Returns Post FBI Seizure: Utilizing LNK & HTA File

The notorious WarzoneRAT malware has made a comeback, despite the FBI's recent efforts to dismantle its operations. Initially detected in…

4 hours ago

Google Revealed Kernel Address Sanitizer To Harden Android Firmware And Beyond

Android devices are popular among hackers due to the platform’s extensive acceptance and open-source nature. However, it has a big…

5 hours ago

Compromised SaaS Supply Chain Apps: 97% of Organizations at Risk of Cyber Attacks

Businesses increasingly rely on Software as a Service (SaaS) applications to drive efficiency, innovation, and growth. However, this shift towards…

5 hours ago

IT and security Leaders Feel Ill-Equipped to Handle Emerging Threats: New Survey

A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed light on the growing concerns within…

8 hours ago

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse engineering .NET malware.  The write-up outlines…

9 hours ago