Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

MikroTik RouterOS 6.41.4 Denial of Service Vulnerability

Information

Severity

Severity

High

Family

Family

Denial of Service

CVSSv2 Base

CVSSv2 Base

7.8

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

4 years ago

Modified

Modified

4 years ago

Summary

MikroTik is prone to a Denial of Service vulnerability.

Insight

Insight

A vulnerability in MikroTik Version 6.41.4 could allow an unauthenticated remote attacker to exhaust all available CPU and all available RAM by sending a crafted FTP request on port 21 that begins with many '\0' characters, preventing the affected router from accepting new FTP connections. The router will reboot after 10 minutes, logging a 'router was rebooted without proper shutdown' message.

Affected Software

Affected Software

MikroTik RouterOS through version 6.41.4.

Detection Method

Detection Method

The script checks if the target is a vulnerable device running a vulnerable firmware version.

Solution

Solution

Update to version 6.42 or above.

Common Vulnerabilities and Exposures (CVE)