MikroTik RouterOS < 6.44.6 LTS or 6.45.x < 6.45.7 Multiple Vulnerabilities

high Nessus Plugin ID 130432


The remote networking device is affected by multiple vulnerabilities.


According to its self-reported version, the remote networking device is running a version of MikroTik RouterOS prior to 6.44.6 LTS or 6.45.x prior to 6.45.7. It is, therefore, affected by multiple vulnerabilities :

- Relative Path Traversal in NPK Parsing - RouterOS 6.45.6 Stable, RouterOS 6.44.5 Long-term, and below are vulnerable to an arbitrary directory creation vulnerability via the upgrade package's name field. If an authenticated user installs a malicious package then a directory could be created and the developer shell could be enabled. (CVE-2019-3976)

- RouterOS 6.45.6 Stable, RouterOS 6.44.5 Long-term, and below insufficiently validate where upgrade packages are download from when using the autoupgrade feature. Therefore, a remote attacker can trick the router into 'upgrading' to an older version of RouterOS and possibly resetting all the system's usernames and passwords. (CVE-2019-3977)

- Insufficient Protections of a Critical Resource (DNS Requests/Cache) - RouterOS versions 6.45.6 Stable, 6.44.5 Long-term, and below allow remote unauthenticated attackers to trigger DNS queries via port 8291. The queries are sent from the router to a server of the attacker's choice. The DNS responses are cached by the router, potentially resulting in cache poisoning.

- Improper DNS Response Handling - RouterOS versions 6.45.6 Stable, 6.44.5 Long-term, and below are vulnerable to a DNS unrelated data attack. The router adds all A records to its DNS cache even when the records are unrelated to the domain that was queried. Therefore, a remote attacker controlled DNS server can poison the router's DNS cache via malicious responses with additional and untrue records.

Note that Nessus has not tested for this issue but has instead relied only on the routers's self-reported version number.


Upgrade to MikroTik RouterOS 6.44.6 LTS, 6.45.7 and later.

See Also




Plugin Details

Severity: High

ID: 130432

File Name: mikrotik_6_45_7.nasl

Version: 1.6

Type: remote

Family: Misc.

Published: 10/31/2019

Updated: 5/18/2022

Configuration: Enable thorough checks

Risk Information


Risk Factor: Medium

Score: 6.6


Risk Factor: High

Base Score: 8.5

Temporal Score: 7.4

Vector: AV:N/AC:L/Au:N/C:N/I:C/A:P

Temporal Vector: E:H/RL:OF/RC:C

CVSS Score Source: CVE-2019-3977


Risk Factor: High

Base Score: 8.8

Temporal Score: 8.4

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:H/RL:O/RC:C

CVSS Score Source: CVE-2019-3976

Vulnerability Information

CPE: cpe:/o:mikrotik:routeros

Required KB Items: MikroTik/RouterOS/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/28/2019

Vulnerability Publication Date: 10/28/2019

Reference Information

CVE: CVE-2019-3976, CVE-2019-3977, CVE-2019-3978, CVE-2019-3979