A vulnerability in MikroTik Version 6.38.5 could allow an unauthenticated remote attacker to exhaust all available CPU via a flood of UDP packets on port 500 (used for L2TP over IPsec), preventing the affected router from accepting new connections; all devices will be disconnected from the router and all logs removed automatically.
The product does not properly control the allocation and maintenance of a limited resource.
Link | Tags |
---|---|
https://cxsecurity.com/issue/WLB-2017050062 | third party advisory exploit |
https://www.vulnerability-lab.com/get_content.php?id=2064 | third party advisory exploit |
http://seclists.org/fulldisclosure/2017/May/59 | third party advisory exploit |
https://packetstormsecurity.com/files/142538/MikroTik-RouterBoard-6.38.5-Denial-Of-Service.html | third party advisory exploit |