Overview
- Description
- A buffer overflow was found in the MikroTik RouterOS SMB service when processing NetBIOS session request messages. Remote attackers with access to the service can exploit this vulnerability and gain code execution on the system. The overflow occurs before authentication takes place, so it is possible for an unauthenticated remote attacker to exploit it. All architectures and all devices running RouterOS before versions 6.41.3/6.42rc27 are vulnerable.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Known exploits
Data from CISA
- Vulnerability name
- MikroTik RouterOS Stack-Based Buffer Overflow Vulnerability
- Exploit added on
- Sep 8, 2022
- Exploit action due
- Sep 29, 2022
- Required action
- Apply updates per vendor instructions.
Weaknesses
- nvd@nist.gov
- CWE-119
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DE5AFDA3-472A-4FAC-A92C-F3836E71603F", "versionEndExcluding": "6.41.3" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:mikrotik:routeros:6.4.2:rc11:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5BF5F829-70A8-4819-AB6D-05C1666F99B5" }, { "criteria": "cpe:2.3:o:mikrotik:routeros:6.4.2:rc12:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8EE1A1D-2DEB-4F42-8446-5DA467D934F4" }, { "criteria": "cpe:2.3:o:mikrotik:routeros:6.4.2:rc14:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "70EEF3DA-9C66-4A3A-B9D3-85B6549499B6" }, { "criteria": "cpe:2.3:o:mikrotik:routeros:6.4.2:rc15:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B659F31-6194-4785-B455-1769982CB45D" }, { "criteria": "cpe:2.3:o:mikrotik:routeros:6.4.2:rc18:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58206CE0-812F-4A23-BFC3-847C663A9D9B" }, { "criteria": "cpe:2.3:o:mikrotik:routeros:6.4.2:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA06DCF1-D620-41F9-919A-3099DA5C834A" }, { "criteria": "cpe:2.3:o:mikrotik:routeros:6.4.2:rc20:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E50FE870-2D1C-44B2-A38E-12A09DF158C0" }, { "criteria": "cpe:2.3:o:mikrotik:routeros:6.4.2:rc23:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "68897675-E7C7-4777-B22A-39F1F3653DF4" }, { "criteria": "cpe:2.3:o:mikrotik:routeros:6.4.2:rc24:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "292CEA28-A4C0-4D9F-8193-8EEF25F46B45" }, { "criteria": "cpe:2.3:o:mikrotik:routeros:6.4.2:rc27:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "884C2425-F41B-441D-AB25-A2751C7D6A07" }, { "criteria": "cpe:2.3:o:mikrotik:routeros:6.4.2:rc5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF44B44C-F37B-46BD-8EB5-929538889EC3" }, { "criteria": "cpe:2.3:o:mikrotik:routeros:6.4.2:rc6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "226D0B58-2DE6-471B-AAFC-F04EEF644217" }, { "criteria": "cpe:2.3:o:mikrotik:routeros:6.4.2:rc9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23E5AD72-30D2-499E-85D3-8A573E05B61D" } ], "operator": "OR" } ] } ]