Vulnerability Description
The L2TP Client in MikroTik RouterOS versions 6.83.3 and 6.37.4 does not enable IPsec encryption after a reboot, which allows man-in-the-middle attackers to view transmitted data unencrypted and gain access to networks on the L2TP server by monitoring the packets for the transmitted data and obtaining the L2TP secret.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mikrotik | Routeros | 6.37.4 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/96447Third Party AdvisoryVDB Entry
- https://blog.milne.it/2017/02/24/mikrotik-routeros-security-vulnerability-l2tp-tExploitThird Party Advisory
- http://www.securityfocus.com/bid/96447Third Party AdvisoryVDB Entry
- https://blog.milne.it/2017/02/24/mikrotik-routeros-security-vulnerability-l2tp-tExploitThird Party Advisory
FAQ
What is CVE-2017-6297?
CVE-2017-6297 is a vulnerability with a CVSS score of 5.9 (MEDIUM). The L2TP Client in MikroTik RouterOS versions 6.83.3 and 6.37.4 does not enable IPsec encryption after a reboot, which allows man-in-the-middle attackers to view transmitted data unencrypted and gain ...
How severe is CVE-2017-6297?
CVE-2017-6297 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-6297?
Check the references section above for vendor advisories and patch information. Affected products include: Mikrotik Routeros.