Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Tenable Researcher Reveals Extended MikroTik Router Vulnerability

    Written by

    Sean Michael Kerner
    Published October 8, 2018
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Routers represent an attractive target for hackers to build botnets and spread malware, especially when the routers have known, unpatched remote code execution vulnerabilities.

      In April, the CVE-2018-14847 vulnerability was first reported in MikroTik routers that have millions of users worldwide. That initial report indicated the scope of the vulnerability was limited and only had moderate impact, but that’s not what Tenable researcher Jacob Baines found. On Oct. 7 at the Derbycon conference, Baines disclosed how attackers can remotely exploit that flaw without the need for any authentication.

      “The fact that we could use a developer back door to root the system and expose the internal network of a company … was the most surprising thing for me,” Baines told eWEEK.

      MikroTik has a large user base, and its routers are deployed in both consumer and enterprise environments, Baines said. MikroTik actually patched the CVE-2018-14847 issue in April, though the initial exploit vector was only given a moderate impact rating. He explained that with the additional exploit vectors he uncovered, MikroTik routers were leaking information that enabled him to get a root shell on vulnerable systems.

      “The CVE-2018-14847 vulnerability is a directory traversal on specific command that enables users to read commands,” Baines explained.

      In a directory traversal attack, hackers run automated tools to get a map of all hidden files and directories. The risk with directory traversal attacks is that files that normally are not exposed can be discovered and mined for sensitive information such as passwords and configuration settings. Baines said he discovered a directory traversal on a different command than what was first reported in April, one that enables a file writing capability that can then be abused to create a root shell. With a root shell, an attacker can have full remote access to a vulnerable device.

      While the attack vector that Baines discovered is a modification and extension of what had previously been disclosed, he said the same patch that MikroTik released in April will protect against the issue he disclosed on Oct. 7. The challenge, he said, is that a lot of users have not patched their devices, perhaps because the initial advisory did not rate the vulnerability as being severe.

      According to Baines, there are still many unpatched MikroTik routers at risk, with as many as 70 percent of vulnerable routers not yet patched.

      Detection

      Baines said Tenable already has plug-ins as part of its security scanning platform to detect the MikroTik router OS vulnerability. Tenable’s security platform includes Security Center for on-premises deployments and tenable.io for the cloud, both of which enable organization to evaluate and manage vulnerabilities.

      As part of his Derbycon talk, Baines released a series of tools on GitHub to help researchers and penetration testers exploit the vulnerability he detailed. He said the tools he released could potentially be ported into the open-source Metasploit framework, making it easier for researchers to test.

      “You’re not supposed to be able to get full root access on these [MikroTik] systems, so a normal user will never be able to tell if they’ve been exploited just by looking at the router,” Baines said. “Users will need some kind of network IDS [intrusion detection system] to be watching traffic for that specific payload.”

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×