MikroTik Security Vulnerability
Dear RACE Valued Customer,
Please be advised,
There is a MikroTik security issue:
MikroTik RouterBoard V-6.38.5 Denial Of Service | CPU Consumption
A vulnerability in the network stack of MikroTik Version 6.38.5 released 2017-03-09 could allow an unauthenticated remote attacker to exhaust all available CPU via a flood of TCP RST packets, preventing the affected router from accepting new TCP connections.
***If you do not know what a MikroTik is, chances are you don’t have one, so please do not be alarmed***
Recommendation:
Check you Mikrotik OS Version and update it to be newer than V-6.38.5.
We recommend you to keep it up to date.
Check you Mikrotik OS Version and update it to be newer than V-6.38.5.
We recommend you to keep it up to date.
For more information please follow these links:
https://cve.mitre.org/cgi-bin/cvename.c … -2017-7285
https://cxsecurity.com/issue/WLB-2017030242
https://www.exploit-db.com/exploits/41752/
https://cve.mitre.org/cgi-bin/cvename.c … -2017-7285
https://cxsecurity.com/issue/WLB-2017030242
https://www.exploit-db.com/exploits/41752/
If you have any further questions or concerns, please email us at [email protected] or click here and select support.
Thank you for your business and continued support,
RACE Communications Support Team