MikroTik RouterOS < 6.39.3 / 6.40.4 / 6.41rc (KRACK)

High Nessus Plugin ID 103857

Synopsis

The remote networking device is affected by a heap corruption vulnerability.

Description

According to its self-reported version, the remote networking device is running a version of MikroTik 6.9.X prior to 6.39.3, 6.40.x < 6.40.4, or 6.41rc. It, therefore, vulnerable to multiple vulnerabilities discovered in the WPA2 handshake protocol.

Solution

Upgrade to MikroTik RouterOS 6.39.3 / 6.40.4 / 6.41rc or later.

See Also

http://www.nessus.org/u?db1a2125

https://forum.mikrotik.com/viewtopic.php?f=21&t=126694

Plugin Details

Severity: High

ID: 103857

File Name: mikrotik_KRACK.nasl

Version: $Revision: 1.9 $

Type: remote

Family: Misc.

Published: 2017/10/16

Modified: 2017/12/21

Dependencies: 30212, 10267

Risk Information

Risk Factor: High

CVSSv2

Base Score: 8.3

Temporal Score: 7.9

Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:U/RC:ND

CVSSv3

Base Score: 7.5

Vector: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/o:mikrotik:routeros

Required KB Items: MikroTik/RouterOS/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2017/10/16

Vulnerability Publication Date: 2017/10/12

Reference Information

CVE: CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13083, CVE-2017-13084, CVE-2017-13085, CVE-2017-13086, CVE-2017-13087

BID: 101274

OSVDB: 167349, 167350, 167351, 167352, 167353, 167354, 167355

IAVA: 2017-A-0310