MikroTik RouterOS < 6.44.6 LTS or 6.45.x < 6.45.7 Multiple Vulnerabilities

High Nessus Plugin ID 130432

Synopsis

The remote networking device is affected by multiple vulnerabilities.

Description

According to its self-reported version, the remote networking device is running a version of MikroTik RouterOS prior to 6.44.6 LTS or 6.45.x prior to 6.45.7. It is, therefore, affected by multiple vulnerabilities :

- Relative Path Traversal in NPK Parsing - RouterOS 6.45.6 Stable, RouterOS 6.44.5 Long-term, and below are vulnerable to an arbitrary directory creation vulnerability via the upgrade package's name field. If an authenticated user installs a malicious package then a directory could be created and the developer shell could be enabled. (CVE-2019-3976)

- RouterOS 6.45.6 Stable, RouterOS 6.44.5 Long-term, and below insufficiently validate where upgrade packages are download from when using the autoupgrade feature. Therefore, a remote attacker can trick the router into 'upgrading' to an older version of RouterOS and possibly resetting all the system's usernames and passwords. (CVE-2019-3977)

- Insufficient Protections of a Critical Resource (DNS Requests/Cache) - RouterOS versions 6.45.6 Stable, 6.44.5 Long-term, and below allow remote unauthenticated attackers to trigger DNS queries via port 8291. The queries are sent from the router to a server of the attacker's choice. The DNS responses are cached by the router, potentially resulting in cache poisoning.

- Improper DNS Response Handling - RouterOS versions 6.45.6 Stable, 6.44.5 Long-term, and below are vulnerable to a DNS unrelated data attack. The router adds all A records to its DNS cache even when the records are unrelated to the domain that was queried. Therefore, a remote attacker controlled DNS server can poison the router's DNS cache via malicious responses with additional and untrue records.

Note that Nessus has not tested for this issue but has instead relied only on the routers's self-reported version number.

Solution

Upgrade to MikroTik RouterOS 6.44.6 LTS, 6.45.7 and later.

See Also

https://www.tenable.com/security/research/tra-2019-46

https://forum.mikrotik.com/viewtopic.php?f=21&t=153378

https://forum.mikrotik.com/viewtopic.php?f=21&t=153379

Plugin Details

Severity: High

ID: 130432

File Name: mikrotik_6_45_7.nasl

Version: 1.3

Type: remote

Family: Misc.

Published: 2019/10/31

Updated: 2019/11/04

Dependencies: 10267, 30212

Risk Information

Risk Factor: High

CVSS Score Source: CVE-2019-3977

CVSS v2.0

Base Score: 8.5

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:C/A:P

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

CVSS v3.0

Base Score: 7.5

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:mikrotik:routeros

Required KB Items: MikroTik/RouterOS/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2019/10/28

Vulnerability Publication Date: 2019/10/28

Reference Information

CVE: CVE-2019-3976, CVE-2019-3977, CVE-2019-3978, CVE-2019-3979