A Serious vulnerability that discovered in MikroTik RouterOS allows attackers to perform DoS attack on the vulnerable router that causes the device to reboot.
MikroTik provides hardware and software for Internet connectivity around the world and they also created a RouterOS software.
This vulnerability allows the watchdog timer to reboots the router that causes device overloaded and eventually stop responding, the issue was addressed and fixed.
But another issue caused the memory to be filled because IPv6 route cache size could be bigger than the available RAM.
This flaw also was fixed by introducing automatic cache size calculation based on available memory, MikroTik said.
MikroTik patches flaw CVE-2018-19299, but an unpatched MikroTik router that routes the traffic via IPV6 will be affected.
It allows an attacker to take down the MikroTik router and exhausting the RAM by routes the malicious traffic via IPV6.
According to MikroTik, Both fixes are released already in RouterOS versions that were published April 2019 (all release chains: RouterOS v6.44.2, RouterOS v6.45beta23, and RouterOS v6.43.14).
This fixes working in the following way,
it means that the current fixes possibly apply to the current version (v6.44.2) and long term (v6.43.14) release versions and this fixes only for the device that contains more than RAM 64 MB size.
So if the routers with RouterOS 6.44.2 do not crash if they have enough memory.
MikroTik advised to Upgrade to any RouterOS version released after April 1st, 2019.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.
Also Read:
Hackers Hijacked 7,500+ MikroTik Routers and Redirecting User Traffic to Attackers
Hackers Attack Over 200,000 MikroTik Routers & Infected with Mass Coinhive Cryptojacking Malware
EclecticIQ cybersecurity researchers have uncovered a cyberespionage operation dubbed "Operation FlightNight" targeting Indian government entities and energy companies. The attackers,…
The notorious WarzoneRAT malware has made a comeback, despite the FBI's recent efforts to dismantle its operations. Initially detected in…
Android devices are popular among hackers due to the platform’s extensive acceptance and open-source nature. However, it has a big…
Businesses increasingly rely on Software as a Service (SaaS) applications to drive efficiency, innovation, and growth. However, this shift towards…
A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed light on the growing concerns within…
Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse engineering .NET malware. The write-up outlines…