First published: Thu Aug 23 2018(Updated: )
Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to a memory exhaustion vulnerability. An authenticated remote attacker can crash the HTTP server and in some circumstances reboot the system via a crafted HTTP POST request.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
MikroTik devices | <6.40.9 | |
MikroTik devices | <6.42.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-1157 is considered medium due to the potential for denial of service affecting affected MikroTik RouterOS versions.
To fix CVE-2018-1157, upgrade your MikroTik RouterOS to version 6.40.10 or later, or version 6.42.8 or later.
CVE-2018-1157 affects MikroTik RouterOS versions prior to 6.42.7 and 6.40.9.
Exploiting CVE-2018-1157 can lead to the HTTP server crashing and, in some cases, a reboot of the MikroTik device.
Yes, an authenticated remote attacker is required to exploit CVE-2018-1157.