First published: Wed May 11 2022(Updated: )
Mikrotik RouterOs before stable 6.48.2 suffers from a memory corruption vulnerability in the tr069-client process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MikroTik RouterOS | <6.48.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36614 is a memory corruption vulnerability in the tr069-client process of Mikrotik RouterOs before stable version 6.48.2, which can be exploited by an authenticated remote attacker to cause a Denial of Service (NULL pointer dereference).
CVE-2021-36614 affects MikroTik RouterOS versions before 6.48.2, making them vulnerable to a memory corruption issue in the tr069-client process.
The severity of CVE-2021-36614 is medium with a severity score of 6.5.
An authenticated remote attacker can exploit CVE-2021-36614 by triggering a memory corruption vulnerability in the tr069-client process, leading to a Denial of Service (NULL pointer dereference).
To mitigate CVE-2021-36614, it is recommended to update MikroTik RouterOS to version 6.48.2 or later, which includes a fix for the memory corruption vulnerability in the tr069-client process.