The MikroTik Router hAP Lite 6.25 has no protection mechanism for unsolicited TCP ACK packets in the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many ACK packets. After the attacker stops the exploit, the CPU usage is 100% and the router requires a reboot for normal operation.
References
Link | Resource |
---|---|
https://packetstormsecurity.com/files/141449/Mikrotik-Hap-Lite-6.25-Denial-Of-Service.html | Exploit Third Party Advisory VDB Entry |
https://cxsecurity.com/issue/WLB-2017030029 | Exploit Third Party Advisory |
http://www.exploitalert.com/view-details.html?id=26137 | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/41601/ | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2017-03-11 21:59
Updated : 2021-05-25 08:03
NVD link : CVE-2017-6444
Mitre link : CVE-2017-6444
JSON object : View
CWE
CWE-400
Uncontrolled Resource Consumption
Products Affected
mikrotik
- router_hap_lite
- routeros