This script is Copyright (C) 2017 Tenable Network Security, Inc.
The remote networking device is affected by a heap corruption
According to its self-reported version, the remote networking device
is running a version of MikroTik 6.9.X prior to 6.39.3, 6.40.x <
6.40.4, or 6.41rc. It, therefore, vulnerable to multiple
vulnerabilities discovered in the WPA2 handshake protocol.
See also :
Upgrade to MikroTik RouterOS 6.39.3 / 6.40.4 / 6.41rc or later.
Risk factor :
High / CVSS Base Score : 8.3
CVSS Temporal Score : 7.9
Public Exploit Available : true
Nessus Plugin ID: 103857 ()
Bugtraq ID: 101274
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now