CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
81.9%
The SSH daemon on MikroTik routers through v6.44.3 could allow remote attackers to generate CPU activity, trigger refusal of new authorized connections, and cause a reboot via connect and write system calls, because of uncontrolled resource management.
Vendor | Product | Version | CPE |
---|---|---|---|
mikrotik | routeros | * | cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:* |
mikrotik | ccr1009-7g-1c-1s\+ | - | cpe:2.3:h:mikrotik:ccr1009-7g-1c-1s\+:-:*:*:*:*:*:*:* |
mikrotik | ccr1009-7g-1c-1s\+pc | - | cpe:2.3:h:mikrotik:ccr1009-7g-1c-1s\+pc:-:*:*:*:*:*:*:* |
mikrotik | ccr1009-7g-1c-pc | - | cpe:2.3:h:mikrotik:ccr1009-7g-1c-pc:-:*:*:*:*:*:*:* |
mikrotik | ccr1016-12g | - | cpe:2.3:h:mikrotik:ccr1016-12g:-:*:*:*:*:*:*:* |
mikrotik | ccr1016-12s-1s\+ | - | cpe:2.3:h:mikrotik:ccr1016-12s-1s\+:-:*:*:*:*:*:*:* |
mikrotik | ccr1036-12g-4s | - | cpe:2.3:h:mikrotik:ccr1036-12g-4s:-:*:*:*:*:*:*:* |
mikrotik | ccr1036-12g-4s-em | - | cpe:2.3:h:mikrotik:ccr1036-12g-4s-em:-:*:*:*:*:*:*:* |
mikrotik | ccr1036-8g-2s\+ | - | cpe:2.3:h:mikrotik:ccr1036-8g-2s\+:-:*:*:*:*:*:*:* |
mikrotik | ccr1036-8g-2s\+em | - | cpe:2.3:h:mikrotik:ccr1036-8g-2s\+em:-:*:*:*:*:*:*:* |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
81.9%