CVE-2019-3978
moderate-risk
Published 2019-10-29
RouterOS versions 6.45.6 Stable, 6.44.5 Long-term, and below allow remote unauthenticated attackers to trigger DNS queries via port 8291. The queries are sent from the router to a server of the attacker's choice. The DNS responses are cached by the router, potentially resulting in cache poisoning
Do I need to act?
!
16.6% chance of exploitation in next 30 days
EPSS score — higher than 83% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Vendors
References (4)
Third Party Advisory
http://packetstormsecurity.com/files/155036/MikroTik-RouterOS-6.45.6-DNS-Cache-P...
Third Party Advisory
https://www.tenable.com/security/research/tra-2019-46
Third Party Advisory
http://packetstormsecurity.com/files/155036/MikroTik-RouterOS-6.45.6-DNS-Cache-P...
Third Party Advisory
https://www.tenable.com/security/research/tra-2019-46
46
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
13/34 · Low
Exposure
7/34 · Low