Description
RouterOS 6.45.6 Stable, RouterOS 6.44.5 Long-term, and below insufficiently validate where upgrade packages are download from when using the autoupgrade feature. Therefore, a remote attacker can trick the router into "upgrading" to an older version of RouterOS and possibly reseting all the system's usernames and passwords.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-13584 | RouterOS 6.45.6 Stable, RouterOS 6.44.5 Long-term, and below insufficiently validate where upgrade packages are download from when using the autoupgrade feature. Therefore, a remote attacker can trick the router into "upgrading" to an older version of RouterOS and possibly reseting all the system's usernames and passwords. |
References
| Link | Providers |
|---|---|
| https://www.tenable.com/security/research/tra-2019-46 |
|
History
No history.
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2024-08-04T19:26:27.646Z
Reserved: 2019-01-03T00:00:00.000Z
Link: CVE-2019-3977
No data.
Status : Modified
Published: 2019-10-29T19:15:20.407
Modified: 2024-11-21T04:42:59.513
Link: CVE-2019-3977
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD