A vulnerability in MikroTik Version 6.38.5 could allow an unauthenticated remote attacker to exhaust all available CPU via a flood of UDP packets on port 500 (used for L2TP over IPsec), preventing the affected router from accepting new connections; all devices will be disconnected from the router and all logs removed automatically.
References
Link | Resource |
---|---|
https://www.vulnerability-lab.com/get_content.php?id=2064 | Exploit Third Party Advisory |
https://packetstormsecurity.com/files/142538/MikroTik-RouterBoard-6.38.5-Denial-Of-Service.html | Exploit Third Party Advisory |
https://cxsecurity.com/issue/WLB-2017050062 | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2017/May/59 | Exploit Third Party Advisory |
Configurations
Information
Published : 2017-05-17 23:29
Updated : 2019-10-02 17:03
NVD link : CVE-2017-8338
Mitre link : CVE-2017-8338
JSON object : View
CWE
CWE-400
Uncontrolled Resource Consumption
Products Affected
mikrotik
- routeros