First published: Wed Aug 22 2018(Updated: )
Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to stack buffer overflow through the license upgrade interface. This vulnerability could theoretically allow a remote authenticated attacker execute arbitrary code on the system.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
MikroTik devices | <6.40.9 | |
MikroTik devices | <6.42.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1156 has a moderate severity rating due to its potential to allow remote code execution.
To fix CVE-2018-1156, upgrade Mikrotik RouterOS to version 6.42.7 or 6.40.9 or later.
CVE-2018-1156 affects all versions of Mikrotik RouterOS prior to 6.42.7 and 6.40.9.
Yes, CVE-2018-1156 can be exploited remotely by an authenticated attacker.
CVE-2018-1156 is a stack buffer overflow vulnerability that can allow arbitrary code execution.