7.5
CVSSv3

CVE-2019-3978

Published: 29/10/2019 Updated: 01/11/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

RouterOS versions 6.45.6 Stable, 6.44.5 Long-term, and below allow remote unauthenticated malicious users to trigger DNS queries via port 8291. The queries are sent from the router to a server of the attacker's choice. The DNS responses are cached by the router, potentially resulting in cache poisoning

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mikrotik routeros

Exploits

# Exploit Title: MikroTik RouterOS 6456 - DNS Cache Poisoning # Date: 2019-10-30 # Exploit Author: Jacob Baines # Vendor Homepage: mikrotikcom/ # Software Link: mikrotikcom/download # Version: 6456 Stable (and below) or 6445 Long-term (and below) # Tested on: Various x86 and MIPSBE RouterOS installs # CVE : CVE-2019-3978 # W ...
MikroTik RouterOS version 6456 DNS cache poisoning exploit ...