First published: Thu May 18 2017(Updated: )
A vulnerability in MikroTik Version 6.38.5 could allow an unauthenticated remote attacker to exhaust all available CPU via a flood of UDP packets on port 500 (used for L2TP over IPsec), preventing the affected router from accepting new connections; all devices will be disconnected from the router and all logs removed automatically.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MikroTik devices | =6.38.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-8338 is classified as critical due to its potential to cause a denial of service.
To fix CVE-2017-8338, upgrade your MikroTik RouterOS to a version later than 6.38.5 that addresses this vulnerability.
CVE-2017-8338 specifically affects devices running MikroTik RouterOS version 6.38.5.
CVE-2017-8338 can allow an unauthenticated attacker to exhaust the CPU resources of the router, causing a denial of service.
Yes, CVE-2017-8338 can be exploited remotely through a flood of UDP packets directed at port 500.