CVE-2017-8338

A vulnerability in MikroTik Version 6.38.5 could allow an unauthenticated remote attacker to exhaust all available CPU via a flood of UDP packets on port 500 (used for L2TP over IPsec), preventing the affected router from accepting new connections; all devices will be disconnected from the router and all logs removed automatically.
Configurations

Configuration 1 (hide)

cpe:2.3:o:mikrotik:routeros:6.38.5:*:*:*:*:*:*:*

History

21 Nov 2024, 03:33

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2017/May/59 - Exploit, Third Party Advisory () http://seclists.org/fulldisclosure/2017/May/59 - Exploit, Third Party Advisory
References () https://cxsecurity.com/issue/WLB-2017050062 - Exploit, Third Party Advisory () https://cxsecurity.com/issue/WLB-2017050062 - Exploit, Third Party Advisory
References () https://packetstormsecurity.com/files/142538/MikroTik-RouterBoard-6.38.5-Denial-Of-Service.html - Exploit, Third Party Advisory () https://packetstormsecurity.com/files/142538/MikroTik-RouterBoard-6.38.5-Denial-Of-Service.html - Exploit, Third Party Advisory
References () https://www.vulnerability-lab.com/get_content.php?id=2064 - Exploit, Third Party Advisory () https://www.vulnerability-lab.com/get_content.php?id=2064 - Exploit, Third Party Advisory

Information

Published : 2017-05-18 06:29

Updated : 2024-11-21 03:33


NVD link : CVE-2017-8338

Mitre link : CVE-2017-8338

CVE.ORG link : CVE-2017-8338


JSON object : View

Products Affected

mikrotik

  • routeros
CWE
CWE-400

Uncontrolled Resource Consumption