CISA KEV 정보
| 취약점명 | MikroTik RouterOS Stack-Based Buffer Overflow Vulnerability |
|---|---|
| 설명 | In MikroTik RouterOS, a stack-based buffer overflow occurs when processing NetBIOS session request messages. Remote attackers with access to the service can exploit this vulnerability and gain code execution on the system. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-119 |
| 등록일 (KEV) | 2022-09-08 |
| 조치 기한 | 2022-09-29 |
| 추가 참고 | https://www.coresecurity.com/core-labs/advisories/mikrotik-routeros-smb-buffer-overflow#vendor_update, https://mikrotik.com/download; https://nvd.nist.gov/vuln/detail/CVE-2018-7445 |
NVD 상세 정보
CVSS v3.1: 9.8 CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HCVSS v2.0: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C설명: A buffer overflow was found in the MikroTik RouterOS SMB service when processing NetBIOS session request messages. Remote attackers with access to the service can exploit this vulnerability and gain code execution on the system. The overflow occurs before authentication takes place, so it is possible for an unauthenticated remote attacker to exploit it. All architectures and all devices running RouterOS before versions 6.41.3/6.42rc27 are vulnerable.
CWE: CWE-119 | CWE-119
참조
- http://seclists.org/fulldisclosure/2018/Mar/38 [Exploit, Mailing List, Third Party Advisory, VDB Entry]
- http://www.securityfocus.com/bid/103427 [Third Party Advisory, VDB Entry]
- https://www.coresecurity.com/advisories/mikrotik-routeros-smb-buffer-overflow [Exploit, Third Party Advisory]
- https://www.exploit-db.com/exploits/44290/ [Exploit, Third Party Advisory, VDB Entry]
- http://seclists.org/fulldisclosure/2018/Mar/38 [Exploit, Mailing List, Third Party Advisory, VDB Entry]
- http://www.securityfocus.com/bid/103427 [Third Party Advisory, VDB Entry]
- https://www.coresecurity.com/advisories/mikrotik-routeros-smb-buffer-overflow [Exploit, Third Party Advisory]
- https://www.exploit-db.com/exploits/44290/ [Exploit, Third Party Advisory, VDB Entry]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-7445 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.