First published: Mon Feb 27 2017(Updated: )
The L2TP Client in MikroTik RouterOS versions 6.83.3 and 6.37.4 does not enable IPsec encryption after a reboot, which allows man-in-the-middle attackers to view transmitted data unencrypted and gain access to networks on the L2TP server by monitoring the packets for the transmitted data and obtaining the L2TP secret.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MikroTik devices | =6.37.4 | |
MikroTik devices | =6.83.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6297 is considered a high severity vulnerability due to the risk of man-in-the-middle attacks.
Fix CVE-2017-6297 by updating MikroTik RouterOS to the latest version where IPsec encryption is enabled by default after reboot.
CVE-2017-6297 affects MikroTik RouterOS versions 6.37.4 and 6.83.3.
The main risks are exposure of transmitted data unencrypted and unauthorized access to networks due to lack of IPsec encryption.
Yes, CVE-2017-6297 is exploit related to improper configuration of L2TP Client encryption settings after a reboot.