First published: Fri Apr 13 2018(Updated: )
An issue was discovered in MikroTik RouterOS 6.41.4. Missing OpenVPN server certificate verification allows a remote unauthenticated attacker capable of intercepting client traffic to act as a malicious OpenVPN server. This may allow the attacker to gain access to the client's internal network (for example, at site-to-site tunnels).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MikroTik devices | =6.41.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10066 is classified as a high severity vulnerability due to its potential for remote exploitation.
To fix CVE-2018-10066, upgrade MikroTik RouterOS to version 6.41.5 or later which includes a patch for this vulnerability.
The impact of CVE-2018-10066 allows attackers to impersonate the OpenVPN server, which can lead to unauthorized access to the internal network.
CVE-2018-10066 affects MikroTik RouterOS version 6.41.4 specifically.
Yes, CVE-2018-10066 can be exploited by a remote unauthenticated attacker capable of intercepting client traffic.