CVE-2018-7445

Published Mar 19, 2018

Last updated 3 days ago

Overview

Description
A buffer overflow was found in the MikroTik RouterOS SMB service when processing NetBIOS session request messages. Remote attackers with access to the service can exploit this vulnerability and gain code execution on the system. The overflow occurs before authentication takes place, so it is possible for an unauthenticated remote attacker to exploit it. All architectures and all devices running RouterOS before versions 6.41.3/6.42rc27 are vulnerable.
Source
cve@mitre.org
NVD status
Modified

Risk scores

CVSS 3.0

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

CVSS 2.0

Type
Primary
Base score
10
Impact score
10
Exploitability score
10
Vector string
AV:N/AC:L/Au:N/C:C/I:C/A:C

Known exploits

Data from CISA

Vulnerability name
MikroTik RouterOS Stack-Based Buffer Overflow Vulnerability
Exploit added on
Sep 8, 2022
Exploit action due
Sep 29, 2022
Required action
Apply updates per vendor instructions.

Weaknesses

nvd@nist.gov
CWE-119

Social media

Hype score
Not currently trending

Configurations