First published: Mon Mar 02 2020(Updated: )
An issue was discovered in Mikrotik RouterOS. Crafting a packet that has a size of 1 byte and sending it to an IPv6 address of a RouterOS box with IP Protocol 97 will cause RouterOS to reboot imminently. All versions of RouterOS that supports EoIPv6 are vulnerable to this attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MikroTik devices |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-5951 is considered a critical vulnerability as it can lead to the immediate reboot of affected MikroTik RouterOS devices.
To mitigate CVE-2018-5951, ensure that your MikroTik RouterOS is updated to the latest version that addresses this vulnerability.
All versions of MikroTik RouterOS that support EoIPv6 are vulnerable to CVE-2018-5951.
CVE-2018-5951 is triggered by sending a specially crafted 1-byte packet to a RouterOS device's IPv6 address using IP Protocol 97.
Yes, CVE-2018-5951 can be exploited remotely by sending malicious packets to the affected MikroTik devices.