MikroTik RouterOS < 6.39.3 / 6.40.4 / 6.41rc (KRACK)

Medium Nessus Plugin ID 103857

Synopsis

The remote networking device is affected by a heap corruption vulnerability.

Description

According to its self-reported version, the remote networking device is running a version of MikroTik 6.9.X prior to 6.39.3, 6.40.x < 6.40.4, or 6.41rc. It, therefore, vulnerable to multiple vulnerabilities discovered in the WPA2 handshake protocol.

Solution

Upgrade to MikroTik RouterOS 6.39.3 / 6.40.4 / 6.41rc or later.

See Also

http://www.nessus.org/u?db1a2125

https://forum.mikrotik.com/viewtopic.php?f=21&t=126694

Plugin Details

Severity: Medium

ID: 103857

File Name: mikrotik_KRACK.nasl

Version: 1.12

Type: remote

Family: Misc.

Published: 2017/10/16

Updated: 2019/11/12

Dependencies: 10267, 30212

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2017-13083

CVSS v2.0

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 8.1

Temporal Score: 7.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:mikrotik:routeros

Required KB Items: MikroTik/RouterOS/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2017/10/16

Vulnerability Publication Date: 2017/10/12

Reference Information

CVE: CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13083, CVE-2017-13084, CVE-2017-13085, CVE-2017-13086, CVE-2017-13087

BID: 101274

IAVA: 2017-A-0310