![]() ![]() The default setting for the DNS server is disabled, but the router still maintains its own DNS cache. It said, "By chaining these vulnerabilities, an unauthenticated remote attacker with access to port 8291 on the router, can perform a RouterOS downgrade, reset the system passwords, and potentially gain a root shell." MikroTik released patches on October 28, 2019. Tenable found the vulnerabilities and disclosed two to MikroTik on Septem( CVE-2019-3976 and CVE-2019-3977) and two more on Septem( CVE-2019-3978 and CVE-2019-3979). The chain starts with DNS poisoning, goes on to downgrading the installed version of MikroTik's RouterOS software, and ends with enabling a backdoor. ![]() ![]() A chain of vulnerabilities in MikroTik routers could allow an attacker to gain a backdoor. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |