Initiatives pour
En tant qu'autorité nationale en matière de cybersécurité, le CCB a développé plusieurs initiatives destinées à des publics spécifiques, qui sont présentées ici.
Reference:
Advisory #2018-27
Version:
1.0
Affected software:
Mikrotik RouterOS firmware versions before 6.42.7 and 6.40.9.
Type:
Remote Code Execution, privilege escalation, Denial of Service
CVE/CVSS:
https://thehackernews.com/2018/10/router-hacking-exploit.html
Successful exploitation of the first two vulnerabilities listed below can result in privilege escalation allowing attackers to gain full system access and access to any internal system that uses the router.
Successful exploitation of the last 3 vulnerabilities listed below can result in a denial of service attack allowing the attackers to prevent proper usage of the system causing economical and/or possible physical damage.
The vulnerabilities impact Mikrotik RouterOS firmware versions before 6.42.7 and 6.40.9.
CERT.be recommends users to always keep their systems up to date and if default credentials are used on the router, to change the default password and keep a unique, long and complex password.
Patches can be downloaded at the vendors website : https://mikrotik.com/download