The L2TP Client in MikroTik RouterOS versions 6.83.3 and 6.37.4 does not enable IPsec encryption after a reboot, which allows man-in-the-middle attackers to view transmitted data unencrypted and gain access to networks on the L2TP server by monitoring the packets for the transmitted data and obtaining the L2TP secret.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/96447 | Third Party Advisory VDB Entry |
https://blog.milne.it/2017/02/24/mikrotik-routeros-security-vulnerability-l2tp-tunnel-unencrypted-cve-2017-6297/ | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/96447 | Third Party Advisory VDB Entry |
https://blog.milne.it/2017/02/24/mikrotik-routeros-security-vulnerability-l2tp-tunnel-unencrypted-cve-2017-6297/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/96447 - Third Party Advisory, VDB Entry | |
References | () https://blog.milne.it/2017/02/24/mikrotik-routeros-security-vulnerability-l2tp-tunnel-unencrypted-cve-2017-6297/ - Exploit, Third Party Advisory |
Information
Published : 2017-02-27 07:59
Updated : 2024-11-21 03:29
NVD link : CVE-2017-6297
Mitre link : CVE-2017-6297
CVE.ORG link : CVE-2017-6297
JSON object : View
Products Affected
mikrotik
- routeros
CWE
CWE-311
Missing Encryption of Sensitive Data