First published: Sun Mar 12 2017(Updated: )
The MikroTik Router hAP Lite 6.25 has no protection mechanism for unsolicited TCP ACK packets in the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many ACK packets. After the attacker stops the exploit, the CPU usage is 100% and the router requires a reboot for normal operation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MikroTik devices | =6.25 | |
MikroTik devices |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6444 is classified as a medium severity vulnerability due to its potential to cause a denial of service.
To mitigate CVE-2017-6444, upgrade your MikroTik RouterOS to a version newer than 6.25.
CVE-2017-6444 enables remote denial of service attacks through the exploitation of unsolicited TCP ACK packets.
CVE-2017-6444 specifically affects MikroTik Router hAP Lite running RouterOS version 6.25.
The impact of CVE-2017-6444 includes increased CPU consumption leading to potential denial of service for legitimate users.