Description
RouterOS 6.45.6 Stable, RouterOS 6.44.5 Long-term, and below insufficiently validate where upgrade packages are download from when using the autoupgrade feature. Therefore, a remote attacker can trick the router into "upgrading" to an older version of RouterOS and possibly reseting all the system's usernames and passwords.
Published: 2019-10-28
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-13584 RouterOS 6.45.6 Stable, RouterOS 6.44.5 Long-term, and below insufficiently validate where upgrade packages are download from when using the autoupgrade feature. Therefore, a remote attacker can trick the router into "upgrading" to an older version of RouterOS and possibly reseting all the system's usernames and passwords.
History

No history.

Subscriptions

Mikrotik Routeros
cve-icon MITRE

Status: PUBLISHED

Assigner: tenable

Published:

Updated: 2024-08-04T19:26:27.646Z

Reserved: 2019-01-03T00:00:00.000Z

Link: CVE-2019-3977

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-10-29T19:15:20.407

Modified: 2024-11-21T04:42:59.513

Link: CVE-2019-3977

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses