First published: Mon Sep 14 2020(Updated: )
An array index error in MikroTik RouterOS 6.41.3 through 6.46.5, and 7.x through 7.0 Beta5, allows an unauthenticated remote attacker to crash the SMB server via modified setup-request packets, aka SUP-12964.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MikroTik devices | >=6.41.3<=6.46.5 | |
MikroTik devices | =7.0-beta3 | |
MikroTik devices | =7.0-beta4 | |
MikroTik devices | =7.0-beta5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11881 has a severity rating that allows unauthenticated remote attackers to crash the SMB server.
To fix CVE-2020-11881, upgrade MikroTik RouterOS to a version that is not affected, specifically beyond 6.46.5 or 7.0 Beta5.
CVE-2020-11881 affects MikroTik RouterOS versions 6.41.3 to 6.46.5 and versions 7.0 Beta3 to 7.0 Beta5.
Yes, CVE-2020-11881 can be exploited remotely by unauthenticated attackers.
CVE-2020-11881 can cause the SMB server on MikroTik devices to crash due to an array index error.