MikroTik RouterOS < 6.39.3 / 6.40.4 / 6.41rc (KRACK)

High Nessus Plugin ID 103857

Synopsis

The remote networking device is affected by a heap corruption vulnerability.

Description

According to its self-reported version, the remote networking device is running a version of MikroTik 6.9.X prior to 6.39.3, 6.40.x < 6.40.4, or 6.41rc. It, therefore, vulnerable to multiple vulnerabilities discovered in the WPA2 handshake protocol.

Solution

Upgrade to MikroTik RouterOS 6.39.3 / 6.40.4 / 6.41rc or later.

See Also

http://www.nessus.org/u?db1a2125

https://forum.mikrotik.com/viewtopic.php?f=21&t=126694

Plugin Details

Severity: High

ID: 103857

File Name: mikrotik_KRACK.nasl

Version: 1.11

Type: remote

Family: Misc.

Published: 2017/10/16

Updated: 2018/07/16

Dependencies: 10267, 30212

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 8.3

Temporal Score: 6.1

Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:mikrotik:routeros

Required KB Items: MikroTik/RouterOS/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2017/10/16

Vulnerability Publication Date: 2017/10/12

Reference Information

CVE: CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13083, CVE-2017-13084, CVE-2017-13085, CVE-2017-13086, CVE-2017-13087

BID: 101274

IAVA: 2017-A-0310