First published: Mon Mar 23 2020(Updated: )
The SSH daemon on MikroTik routers through v6.44.3 could allow remote attackers to generate CPU activity, trigger refusal of new authorized connections, and cause a reboot via connect and write system calls, because of uncontrolled resource management.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MikroTik RouterOS | <=6.44.3 | |
Mikrotik Ccr1009-7g-1c-1s\+ | ||
Mikrotik Ccr1009-7g-1c-1s\+pc | ||
Mikrotik Ccr1009-7g-1c-pc | ||
Mikrotik Ccr1016-12g | ||
Mikrotik Ccr1016-12s-1s\+ | ||
Mikrotik Ccr1036-12g-4s | ||
Mikrotik Ccr1036-12g-4s-em | ||
Mikrotik Ccr1036-8g-2s\+ | ||
Mikrotik Ccr1036-8g-2s\+em | ||
Mikrotik Ccr1072-1g-8s\+ | ||
Mikrotik Hex | ||
Mikrotik Hex Lite | ||
Mikrotik Hex Poe | ||
Mikrotik Hex Poe Lite | ||
Mikrotik Hex S | ||
Mikrotik Powerbox | ||
Mikrotik Powerbox Pro | ||
Mikrotik Rb1100ahx4 | ||
Mikrotik Rb1100ahx4 | ||
Mikrotik Rb2011il-in | ||
Mikrotik Rb2011il-rm | ||
Mikrotik Rb2011ils-in | ||
Mikrotik Rb2011uias-in | ||
Mikrotik Rb2011uias-rm | ||
Mikrotik Rb3011uias-rm | ||
Mikrotik Rb4011igs\+rm |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.