Lucene search

K

4 matches found

CVE
CVE
added 2019/10/29 7:15 p.m.216 views

CVE-2019-3978

RouterOS versions 6.45.6 Stable, 6.44.5 Long-term, and below allow remote unauthenticated attackers to trigger DNS queries via port 8291. The queries are sent from the router to a server of the attacker's choice. The DNS responses are cached by the router, potentially resulting in cache poisoning

7.5CVSS7.6AI score0.20018EPSS
CVE
CVE
added 2019/10/29 7:15 p.m.176 views

CVE-2019-3976

RouterOS 6.45.6 Stable, RouterOS 6.44.5 Long-term, and below are vulnerable to an arbitrary directory creation vulnerability via the upgrade package's name field. If an authenticated user installs a malicious package then a directory could be created and the developer shell could be enabled.

8.8CVSS8.5AI score0.00719EPSS
CVE
CVE
added 2019/10/29 7:15 p.m.161 views

CVE-2019-3977

RouterOS 6.45.6 Stable, RouterOS 6.44.5 Long-term, and below insufficiently validate where upgrade packages are download from when using the autoupgrade feature. Therefore, a remote attacker can trick the router into "upgrading" to an older version of RouterOS and possibly reseting all the system's...

8.5CVSS8AI score0.00677EPSS
CVE
CVE
added 2019/10/29 7:15 p.m.144 views

CVE-2019-3979

RouterOS versions 6.45.6 Stable, 6.44.5 Long-term, and below are vulnerable to a DNS unrelated data attack. The router adds all A records to its DNS cache even when the records are unrelated to the domain that was queried. Therefore, a remote attacker controlled DNS server can poison the router's D...

7.5CVSS7.5AI score0.00175EPSS