[Oct 09, 2018]
A cybersecurity researcher from Tenable Research has released a new proof-of-concept (PoC) RCE attack for an old directory traversal vulnerability that was found and patched within a day of its discovery in April this year.
The vulnerability, now rated critical because the new hacking technique used against vulnerable MikroTik routers allows attackers to remotely execute code on affected devices and gain a root shell.
The vulnerability allows “remote attackers to bypass authentication and read arbitrary files by modifying a request to change one byte related to a Session ID.”
The vulnerabilities impact Mikrotik RouterOS firmware versions before 6.42.7 and 6.40.9.
While all the vulnerabilities were patched over a month ago, a recent scan by Tenable Research revealed that 70 percent of routers (which equals to 200,000) are still vulnerable to attack.
Cyber Security Tips :
- If you own a MikroTik router and you have not updated its RouterOS, you should do it right now.
- If you are still using default credentials on your router, it is high time to change the default password and keep a unique, long and complex password.