First published: Thu Aug 23 2018(Updated: )
Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to a memory corruption vulnerability. An authenticated remote attacker can crash the HTTP server by rapidly authenticating and disconnecting.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
MikroTik devices | <6.40.9 | |
MikroTik devices | <6.42.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1159 has been classified as a medium-severity memory corruption vulnerability.
To remediate CVE-2018-1159, upgrade your MikroTik RouterOS to version 6.42.7 or 6.40.9 or later.
CVE-2018-1159 affects MikroTik RouterOS versions earlier than 6.42.7 and 6.40.9.
Yes, CVE-2018-1159 can be exploited remotely by an authenticated attacker.
The impact of CVE-2018-1159 includes crashing the HTTP server on affected MikroTik devices.