Vulnerability Description
A vulnerability in the network stack of MikroTik Version 6.38.5 released 2017-03-09 could allow an unauthenticated remote attacker to exhaust all available CPU via a flood of TCP RST packets, preventing the affected router from accepting new TCP connections.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mikrotik | Routeros | 6.38.5 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/97266Third Party AdvisoryVDB Entry
- https://cxsecurity.com/issue/WLB-2017030242ExploitThird Party Advisory
- https://www.exploit-db.com/exploits/41752/ExploitThird Party Advisory
- http://www.securityfocus.com/bid/97266Third Party AdvisoryVDB Entry
- https://cxsecurity.com/issue/WLB-2017030242ExploitThird Party Advisory
- https://www.exploit-db.com/exploits/41752/ExploitThird Party Advisory
FAQ
What is CVE-2017-7285?
CVE-2017-7285 is a vulnerability with a CVSS score of 7.5 (HIGH). A vulnerability in the network stack of MikroTik Version 6.38.5 released 2017-03-09 could allow an unauthenticated remote attacker to exhaust all available CPU via a flood of TCP RST packets, preventi...
How severe is CVE-2017-7285?
CVE-2017-7285 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-7285?
Check the references section above for vendor advisories and patch information. Affected products include: Mikrotik Routeros.