Lucene search

K
nvd[email protected]NVD:CVE-2018-7445
HistoryMar 19, 2018 - 9:29 p.m.

CVE-2018-7445

2018-03-1921:29:01
CWE-119
web.nvd.nist.gov
7

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.822

Percentile

98.5%

A buffer overflow was found in the MikroTik RouterOS SMB service when processing NetBIOS session request messages. Remote attackers with access to the service can exploit this vulnerability and gain code execution on the system. The overflow occurs before authentication takes place, so it is possible for an unauthenticated remote attacker to exploit it. All architectures and all devices running RouterOS before versions 6.41.3/6.42rc27 are vulnerable.

Affected configurations

Nvd
Node
mikrotikrouterosRange<6.41.3
Node
mikrotikrouterosMatch6.4.2rc11
OR
mikrotikrouterosMatch6.4.2rc12
OR
mikrotikrouterosMatch6.4.2rc14
OR
mikrotikrouterosMatch6.4.2rc15
OR
mikrotikrouterosMatch6.4.2rc18
OR
mikrotikrouterosMatch6.4.2rc2
OR
mikrotikrouterosMatch6.4.2rc20
OR
mikrotikrouterosMatch6.4.2rc23
OR
mikrotikrouterosMatch6.4.2rc24
OR
mikrotikrouterosMatch6.4.2rc27
OR
mikrotikrouterosMatch6.4.2rc5
OR
mikrotikrouterosMatch6.4.2rc6
OR
mikrotikrouterosMatch6.4.2rc9
VendorProductVersionCPE
mikrotikrouteros*cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*
mikrotikrouteros6.4.2cpe:2.3:o:mikrotik:routeros:6.4.2:rc11:*:*:*:*:*:*
mikrotikrouteros6.4.2cpe:2.3:o:mikrotik:routeros:6.4.2:rc12:*:*:*:*:*:*
mikrotikrouteros6.4.2cpe:2.3:o:mikrotik:routeros:6.4.2:rc14:*:*:*:*:*:*
mikrotikrouteros6.4.2cpe:2.3:o:mikrotik:routeros:6.4.2:rc15:*:*:*:*:*:*
mikrotikrouteros6.4.2cpe:2.3:o:mikrotik:routeros:6.4.2:rc18:*:*:*:*:*:*
mikrotikrouteros6.4.2cpe:2.3:o:mikrotik:routeros:6.4.2:rc2:*:*:*:*:*:*
mikrotikrouteros6.4.2cpe:2.3:o:mikrotik:routeros:6.4.2:rc20:*:*:*:*:*:*
mikrotikrouteros6.4.2cpe:2.3:o:mikrotik:routeros:6.4.2:rc23:*:*:*:*:*:*
mikrotikrouteros6.4.2cpe:2.3:o:mikrotik:routeros:6.4.2:rc24:*:*:*:*:*:*
Rows per page:
1-10 of 141

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.822

Percentile

98.5%