The SSH daemon on MikroTik routers through v6.44.3 could allow remote attackers to generate CPU activity, trigger refusal of new authorized connections, and cause a reboot via connect and write system calls, because of uncontrolled resource management.
References
Link | Resource |
---|---|
https://packetstormsecurity.com/files/156790/Microtik-SSH-Daemon-6.44.3-Denial-Of-Service.html | Exploit Mitigation Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/48228 | Exploit Mitigation Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2020-03-23 09:15
Updated : 2021-07-21 04:39
NVD link : CVE-2020-10364
Mitre link : CVE-2020-10364
JSON object : View
CWE
CWE-770
Allocation of Resources Without Limits or Throttling
Products Affected
mikrotik
- rb3011uias-rm
- ccr1072-1g-8s\+
- rb4011igs\+rm
- hex_poe
- rb2011uias-in
- ccr1036-8g-2s\+
- rb2011il-in
- ccr1016-12g
- ccr1036-12g-4s
- hex
- hex_s
- ccr1036-12g-4s-em
- rb1100ahx4
- ccr1036-8g-2s\+em
- hex_poe_lite
- rb2011il-rm
- powerbox_pro
- routeros
- rb2011ils-in
- ccr1009-7g-1c-1s\+
- ccr1009-7g-1c-1s\+pc
- hex_lite
- ccr1016-12s-1s\+
- ccr1009-7g-1c-pc
- powerbox
- rb2011uias-rm