A vulnerability in MikroTik Version 6.38.5 could allow an unauthenticated remote attacker to exhaust all available CPU via a flood of UDP packets on port 500 (used for L2TP over IPsec), preventing the affected router from accepting new connections; all devices will be disconnected from the router and all logs removed automatically.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2017/May/59 | Exploit Third Party Advisory |
https://cxsecurity.com/issue/WLB-2017050062 | Exploit Third Party Advisory |
https://packetstormsecurity.com/files/142538/MikroTik-RouterBoard-6.38.5-Denial-Of-Service.html | Exploit Third Party Advisory |
https://www.vulnerability-lab.com/get_content.php?id=2064 | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2017/May/59 | Exploit Third Party Advisory |
https://cxsecurity.com/issue/WLB-2017050062 | Exploit Third Party Advisory |
https://packetstormsecurity.com/files/142538/MikroTik-RouterBoard-6.38.5-Denial-Of-Service.html | Exploit Third Party Advisory |
https://www.vulnerability-lab.com/get_content.php?id=2064 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2017/May/59 - Exploit, Third Party Advisory | |
References | () https://cxsecurity.com/issue/WLB-2017050062 - Exploit, Third Party Advisory | |
References | () https://packetstormsecurity.com/files/142538/MikroTik-RouterBoard-6.38.5-Denial-Of-Service.html - Exploit, Third Party Advisory | |
References | () https://www.vulnerability-lab.com/get_content.php?id=2064 - Exploit, Third Party Advisory |
Information
Published : 2017-05-18 06:29
Updated : 2024-11-21 03:33
NVD link : CVE-2017-8338
Mitre link : CVE-2017-8338
CVE.ORG link : CVE-2017-8338
JSON object : View
Products Affected
mikrotik
- routeros
CWE
CWE-400
Uncontrolled Resource Consumption