US: +1 561 2500001/EU: +359 2 4925555 LiveChat
[email protected] Sign Up Login
ITLDC
  • NVMe/SSD VDS
  • HD VDS
  • Servers
  • Hosting
  • Support
  • Blog
  • Contact
  • [UA]
  • NVMe/SSD VDS
  • HD VDS
  • Servers
  • Hosting
  • Support
  • Blog
  • Contact
  • [UA]

Mikrotik devices vulnerability, upgrade now

Mikrotik devices vulnerability, upgrade now

Oct 30, 2019DmytroBlog, News

A few days ago security company named Tenable released a report about a series of vulnerabilities in Mikrotik devices. Mikrotik routers are widely used not only in company internal networks and for SOHO installations – many devices of this manufacturer also work in data centers, providing site-to-site VPN access.

Software bug allows hacker to use Winbox protocol (tcp/8291), which is used to connect an external device configuration utility. An attacker has the ability to replace software update servers with own one and download either firmware with a default password to the device or generate a special update package containing malicious code.

This series of vulnerabilities received identifiers CVE-2019-3976, CVE-2019-3977, CVE-2019-3978, CVE-2019-3979. The developer has already released software updates for Mikrotik devices, RouterOS versions with patches are numbered 6.45.7 (stable), 6.44.6 (long-term) and 6.46beta59 (testing).

We recommend that all users using Mikrotik products immediately schedule maintenance and upgrade their RouterOS-based devices. There will also be justified step to turn off access to Winbox completely or use filters to access this protocol only with trusted IP-addresses.

For more details check following pages:

  • PACKAGE VALIDATION AND UPGRADE VULNERABILITY
  • DNS CACHE POISONING VULNERABILITY
  • RouterOS: Chain to Root
Tags: mikrotik,  security
Related Posts
  • Let’s Encrypt πŸ” is Great, But What If You Need a Backup Plan? πŸš€πŸ”‘

  • How to Secure Your VDS or Dedicated Server Running Windows Server πŸ›‘οΈπŸ’»

  • Let’s Talk Cybersecurity: Keeping Your Server Safe πŸ›‘οΈπŸ’»

  • Important Security Notice: Cyberpanel Vulnerability Detected πŸ”

← EU5.GDN network upgrade: is even faster!
Halloween 2019 promotion! →

US/APAC Support

ITLDC

PO Box #800054
Aventura
FL 33280
USA

+1 561 2500001

[email protected]

EU Support

Smart Industries LLC

187E Warm Springs Rd B218
Las Vegas
NV 89119
USA

+1 561 2500001

[email protected]

Services

  • SSD VDS
  • Dedicated Servers
  • Shared Hosting
  • Colocation
  • DDoS Protection
  • SSL Certificates
  • Backup Storage
  • Reselling

Support

  • Get Help
  • ITLDC Status
  • Looking Glass
  • Our SLA
  • Datacenters
  • FAQ & Knowledgebase
  • Data Security
  • Contact us

Β© Copyright 1995-2019 ITLDC Team. You can freely use or share information from this site with a hyperlink to the original page.