Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
Reference:
Advisory #2018-27
Version:
1.0
Affected software:
Mikrotik RouterOS firmware versions before 6.42.7 and 6.40.9.
Type:
Remote Code Execution, privilege escalation, Denial of Service
CVE/CVSS:
https://thehackernews.com/2018/10/router-hacking-exploit.html
Successful exploitation of the first two vulnerabilities listed below can result in privilege escalation allowing attackers to gain full system access and access to any internal system that uses the router.
Successful exploitation of the last 3 vulnerabilities listed below can result in a denial of service attack allowing the attackers to prevent proper usage of the system causing economical and/or possible physical damage.
The vulnerabilities impact Mikrotik RouterOS firmware versions before 6.42.7 and 6.40.9.
CERT.be recommends users to always keep their systems up to date and if default credentials are used on the router, to change the default password and keep a unique, long and complex password.
Patches can be downloaded at the vendors website : https://mikrotik.com/download