Vulnerabilites related to mikrotik - ccr1009-7g-1c-pc
Vulnerability from fkie_nvd
Published
2019-07-03 21:15
Modified
2024-11-21 04:24
Summary
A vulnerability in the FTP daemon on MikroTik routers through 6.44.3 could allow remote attackers to exhaust all available memory, causing the device to reboot because of uncontrolled resource management.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7B30CA4-E14C-4D48-97A5-D761E3CE4E27",
              "versionEndIncluding": "6.44.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mikrotik:ccr1009-7g-1c-1s\\+:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1FD987-CA1F-4FDA-B381-D9DBC17B99A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:ccr1009-7g-1c-1s\\+pc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "526F57A0-66E5-47B0-AA56-129A68591B9C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:ccr1009-7g-1c-pc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B295C919-5D41-48EC-BE97-21A7A51B0900",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:ccr1016-12g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "918648BA-4A2B-455C-8348-98A5911F5721",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:ccr1016-12s-1s\\+:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAB272F1-D066-4D9F-886E-CA883ABF447D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:ccr1036-12g-4s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3516BAD4-FFA4-4C4A-B1DB-F6B393488554",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:ccr1036-12g-4s-em:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AFCA937-CA92-409D-BC29-B0424BB8F2EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:ccr1036-8g-2s\\+:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C7B0504-C1F7-4E83-B225-090A3BFF40E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:ccr1036-8g-2s\\+em:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F116F5D-0ECE-4485-A0B6-4B4636169504",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:ccr1072-1g-8s\\+:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "423B1B58-B64B-4797-A9BA-AA3D53F8A3F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:hex:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625E3C1B-73EE-431E-A73E-A5909DA330E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:hex_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D501654E-8A50-4279-8930-4DCCD4821875",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:hex_poe:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47B00042-7C48-47B7-BF84-9654C71B3D63",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:hex_poe_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5AA7241-64CC-49FB-9019-5C1A82F461A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:hex_s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EF3EC35-EE46-4688-AD8F-13D609789824",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:powerbox:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2FBDC6D-3EE7-41F1-B633-E6445D00698B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:powerbox_pro:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C7C26C0-7553-4BD4-ACC8-80C8FFF01727",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:rb1100ahx4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE3A5B6E-1C32-446F-8ADE-63C477D4A6E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:rb1100ahx4:-:*:dude:*:*:*:*:*",
              "matchCriteriaId": "4F5D365D-D2CE-4449-A31F-073F0A0C95C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:rb2011il-in:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A41B00D7-D928-4201-B99C-EAE30735C09D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:rb2011il-rm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8A7CA16-45FC-406A-8558-62AE2289D76D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:rb2011ils-in:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95FA4DB1-5C25-4C52-9C25-7F6A1CD1C089",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:rb2011uias-in:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC6A357D-C6AA-44FD-960E-99D86E0AF88D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:rb2011uias-rm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "769077CF-8F3A-4C7B-B608-8185719A0552",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:rb3011uias-rm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBB41A1C-7B95-41D4-BFF7-F339FDDD7A6A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:rb4011igs\\+rm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11591C89-43B0-4C40-A84D-0D5C19DCE982",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the FTP daemon on MikroTik routers through 6.44.3 could allow remote attackers to exhaust all available memory, causing the device to reboot because of uncontrolled resource management."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en el demonio FTP en los enrutadores MikroTik hasta la versi\u00f3n 6.44.3 podr\u00eda permitir a los atacantes remotos agotar toda la memoria disponible, lo que provocar\u00eda que el dispositivo se reiniciara debido a la administraci\u00f3n de recursos no controlada."
    }
  ],
  "id": "CVE-2019-13074",
  "lastModified": "2024-11-21T04:24:08.800",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-07-03T21:15:10.513",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://forum.mikrotik.com/viewtopic.php?t=150045"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://mikrotik.com/download/changelogs/stable-release-tree"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://forum.mikrotik.com/viewtopic.php?t=150045"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://mikrotik.com/download/changelogs/stable-release-tree"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-770"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-03-23 16:15
Modified
2024-11-21 04:55
Summary
The SSH daemon on MikroTik routers through v6.44.3 could allow remote attackers to generate CPU activity, trigger refusal of new authorized connections, and cause a reboot via connect and write system calls, because of uncontrolled resource management.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7B30CA4-E14C-4D48-97A5-D761E3CE4E27",
              "versionEndIncluding": "6.44.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mikrotik:ccr1009-7g-1c-1s\\+:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1FD987-CA1F-4FDA-B381-D9DBC17B99A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:ccr1009-7g-1c-1s\\+pc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "526F57A0-66E5-47B0-AA56-129A68591B9C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:ccr1009-7g-1c-pc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B295C919-5D41-48EC-BE97-21A7A51B0900",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:ccr1016-12g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "918648BA-4A2B-455C-8348-98A5911F5721",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:ccr1016-12s-1s\\+:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAB272F1-D066-4D9F-886E-CA883ABF447D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:ccr1036-12g-4s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3516BAD4-FFA4-4C4A-B1DB-F6B393488554",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:ccr1036-12g-4s-em:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AFCA937-CA92-409D-BC29-B0424BB8F2EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:ccr1036-8g-2s\\+:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C7B0504-C1F7-4E83-B225-090A3BFF40E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:ccr1036-8g-2s\\+em:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F116F5D-0ECE-4485-A0B6-4B4636169504",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:ccr1072-1g-8s\\+:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "423B1B58-B64B-4797-A9BA-AA3D53F8A3F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:hex:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625E3C1B-73EE-431E-A73E-A5909DA330E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:hex_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D501654E-8A50-4279-8930-4DCCD4821875",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:hex_poe:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47B00042-7C48-47B7-BF84-9654C71B3D63",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:hex_poe_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5AA7241-64CC-49FB-9019-5C1A82F461A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:hex_s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EF3EC35-EE46-4688-AD8F-13D609789824",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:powerbox:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2FBDC6D-3EE7-41F1-B633-E6445D00698B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:powerbox_pro:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C7C26C0-7553-4BD4-ACC8-80C8FFF01727",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:rb1100ahx4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE3A5B6E-1C32-446F-8ADE-63C477D4A6E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:rb1100ahx4:-:*:dude:*:*:*:*:*",
              "matchCriteriaId": "4F5D365D-D2CE-4449-A31F-073F0A0C95C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:rb2011il-in:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A41B00D7-D928-4201-B99C-EAE30735C09D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:rb2011il-rm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8A7CA16-45FC-406A-8558-62AE2289D76D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:rb2011ils-in:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95FA4DB1-5C25-4C52-9C25-7F6A1CD1C089",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:rb2011uias-in:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC6A357D-C6AA-44FD-960E-99D86E0AF88D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:rb2011uias-rm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "769077CF-8F3A-4C7B-B608-8185719A0552",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:rb3011uias-rm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBB41A1C-7B95-41D4-BFF7-F339FDDD7A6A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:mikrotik:rb4011igs\\+rm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11591C89-43B0-4C40-A84D-0D5C19DCE982",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SSH daemon on MikroTik routers through v6.44.3 could allow remote attackers to generate CPU activity, trigger refusal of new authorized connections, and cause a reboot via connect and write system calls, because of uncontrolled resource management."
    },
    {
      "lang": "es",
      "value": "El demonio SSH en los enrutadores MikroTik versiones hasta v6.44.3, podr\u00eda permitir a atacantes remotos generar actividad de CPU, desencadenar un rechazo de nuevas conexiones autorizadas y causar un reinicio por medio de llamadas de sistema de conexi\u00f3n y escritura, debido a una gesti\u00f3n de recursos no controlada."
    }
  ],
  "id": "CVE-2020-10364",
  "lastModified": "2024-11-21T04:55:09.437",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-03-23T16:15:13.220",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Mitigation",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://packetstormsecurity.com/files/156790/Microtik-SSH-Daemon-6.44.3-Denial-Of-Service.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Mitigation",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/48228"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mitigation",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://packetstormsecurity.com/files/156790/Microtik-SSH-Daemon-6.44.3-Denial-Of-Service.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mitigation",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/48228"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-770"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2020-10364
Vulnerability from cvelistv5
Published
2020-03-23 15:56
Modified
2024-08-04 10:58
Severity ?
Summary
The SSH daemon on MikroTik routers through v6.44.3 could allow remote attackers to generate CPU activity, trigger refusal of new authorized connections, and cause a reboot via connect and write system calls, because of uncontrolled resource management.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:58:40.237Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/48228"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://packetstormsecurity.com/files/156790/Microtik-SSH-Daemon-6.44.3-Denial-Of-Service.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The SSH daemon on MikroTik routers through v6.44.3 could allow remote attackers to generate CPU activity, trigger refusal of new authorized connections, and cause a reboot via connect and write system calls, because of uncontrolled resource management."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-03-23T15:56:19",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.exploit-db.com/exploits/48228"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://packetstormsecurity.com/files/156790/Microtik-SSH-Daemon-6.44.3-Denial-Of-Service.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-10364",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SSH daemon on MikroTik routers through v6.44.3 could allow remote attackers to generate CPU activity, trigger refusal of new authorized connections, and cause a reboot via connect and write system calls, because of uncontrolled resource management."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.exploit-db.com/exploits/48228",
              "refsource": "MISC",
              "url": "https://www.exploit-db.com/exploits/48228"
            },
            {
              "name": "https://packetstormsecurity.com/files/156790/Microtik-SSH-Daemon-6.44.3-Denial-Of-Service.html",
              "refsource": "MISC",
              "url": "https://packetstormsecurity.com/files/156790/Microtik-SSH-Daemon-6.44.3-Denial-Of-Service.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-10364",
    "datePublished": "2020-03-23T15:56:19",
    "dateReserved": "2020-03-10T00:00:00",
    "dateUpdated": "2024-08-04T10:58:40.237Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-13074
Vulnerability from cvelistv5
Published
2019-07-03 20:07
Modified
2024-08-04 23:41
Severity ?
Summary
A vulnerability in the FTP daemon on MikroTik routers through 6.44.3 could allow remote attackers to exhaust all available memory, causing the device to reboot because of uncontrolled resource management.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T23:41:10.468Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://forum.mikrotik.com/viewtopic.php?t=150045"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://mikrotik.com/download/changelogs/stable-release-tree"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2019-06-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the FTP daemon on MikroTik routers through 6.44.3 could allow remote attackers to exhaust all available memory, causing the device to reboot because of uncontrolled resource management."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-07-10T13:07:09",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://forum.mikrotik.com/viewtopic.php?t=150045"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://mikrotik.com/download/changelogs/stable-release-tree"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-13074",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the FTP daemon on MikroTik routers through 6.44.3 could allow remote attackers to exhaust all available memory, causing the device to reboot because of uncontrolled resource management."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://forum.mikrotik.com/viewtopic.php?t=150045",
              "refsource": "CONFIRM",
              "url": "https://forum.mikrotik.com/viewtopic.php?t=150045"
            },
            {
              "name": "https://mikrotik.com/download/changelogs/stable-release-tree",
              "refsource": "CONFIRM",
              "url": "https://mikrotik.com/download/changelogs/stable-release-tree"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-13074",
    "datePublished": "2019-07-03T20:07:27",
    "dateReserved": "2019-06-30T00:00:00",
    "dateUpdated": "2024-08-04T23:41:10.468Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}