CVE-2017-6444

The MikroTik Router hAP Lite 6.25 has no protection mechanism for unsolicited TCP ACK packets in the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many ACK packets. After the attacker stops the exploit, the CPU usage is 100% and the router requires a reboot for normal operation.
References
Link Resource
https://packetstormsecurity.com/files/141449/Mikrotik-Hap-Lite-6.25-Denial-Of-Service.html Exploit Third Party Advisory VDB Entry
https://cxsecurity.com/issue/WLB-2017030029 Exploit Third Party Advisory
http://www.exploitalert.com/view-details.html?id=26137 Exploit Third Party Advisory
https://www.exploit-db.com/exploits/41601/ Exploit Third Party Advisory VDB Entry
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:mikrotik:routeros:6.25:*:*:*:*:*:*:*
cpe:2.3:h:mikrotik:router_hap_lite:-:*:*:*:*:*:*:*

Information

Published : 2017-03-11 21:59

Updated : 2021-05-25 08:03


NVD link : CVE-2017-6444

Mitre link : CVE-2017-6444


JSON object : View

CWE
CWE-400

Uncontrolled Resource Consumption

Advertisement

dedicated server usa

Products Affected

mikrotik

  • router_hap_lite
  • routeros