CVE-2017-6444

The MikroTik Router hAP Lite 6.25 has no protection mechanism for unsolicited TCP ACK packets in the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many ACK packets. After the attacker stops the exploit, the CPU usage is 100% and the router requires a reboot for normal operation.
References
Link Resource
http://www.exploitalert.com/view-details.html?id=26137 Exploit Third Party Advisory
https://cxsecurity.com/issue/WLB-2017030029 Exploit Third Party Advisory
https://packetstormsecurity.com/files/141449/Mikrotik-Hap-Lite-6.25-Denial-Of-Service.html Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/41601/ Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:mikrotik:routeros:6.25:*:*:*:*:*:*:*
cpe:2.3:h:mikrotik:router_hap_lite:-:*:*:*:*:*:*:*

History

25 May 2021, 15:03

Type Values Removed Values Added
References (EXPLOIT-DB) https://www.exploit-db.com/exploits/41601/ - (EXPLOIT-DB) https://www.exploit-db.com/exploits/41601/ - Exploit, Third Party Advisory, VDB Entry
CPE cpe:2.3:o:mikrotik:router_hap_lite_firmware:6.25:*:*:*:*:*:*:* cpe:2.3:o:mikrotik:routeros:6.25:*:*:*:*:*:*:*

Information

Published : 2017-03-12 05:59

Updated : 2023-12-10 12:01


NVD link : CVE-2017-6444

Mitre link : CVE-2017-6444

CVE.ORG link : CVE-2017-6444


JSON object : View

Products Affected

mikrotik

  • routeros
  • router_hap_lite
CWE
CWE-400

Uncontrolled Resource Consumption