Lucene search

K

4 matches found

CVE
CVE
added 2017/02/27 7:59 a.m.52 views

CVE-2017-6297

The L2TP Client in MikroTik RouterOS versions 6.83.3 and 6.37.4 does not enable IPsec encryption after a reboot, which allows man-in-the-middle attackers to view transmitted data unencrypted and gain access to networks on the L2TP server by monitoring the packets for the transmitted data and obtain...

5.9CVSS5.6AI score0.00079EPSS
CVE
CVE
added 2017/03/12 5:59 a.m.50 views

CVE-2017-6444

The MikroTik Router hAP Lite 6.25 has no protection mechanism for unsolicited TCP ACK packets in the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many ACK packets. After the attacker stops the exploit, the CPU usage is 10...

7.8CVSS7.3AI score0.19858EPSS
CVE
CVE
added 2017/03/29 2:59 p.m.50 views

CVE-2017-7285

A vulnerability in the network stack of MikroTik Version 6.38.5 released 2017-03-09 could allow an unauthenticated remote attacker to exhaust all available CPU via a flood of TCP RST packets, preventing the affected router from accepting new TCP connections.

7.8CVSS7.4AI score0.20817EPSS
CVE
CVE
added 2017/05/18 6:29 a.m.43 views

CVE-2017-8338

A vulnerability in MikroTik Version 6.38.5 could allow an unauthenticated remote attacker to exhaust all available CPU via a flood of UDP packets on port 500 (used for L2TP over IPsec), preventing the affected router from accepting new connections; all devices will be disconnected from the router a...

7.8CVSS7.5AI score0.02883EPSS