HIGH · 7.5

CVE-2020-10364

The SSH daemon on MikroTik routers through v6.44.3 could allow remote attackers to generate CPU activity, trigger refusal of new authorized connections, and cause a reboot via connect and write system...

Vulnerability Description

The SSH daemon on MikroTik routers through v6.44.3 could allow remote attackers to generate CPU activity, trigger refusal of new authorized connections, and cause a reboot via connect and write system calls, because of uncontrolled resource management.

CVSS Score

7.5

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
MikrotikRouteros<= 6.44.3
MikrotikCcr1009-7G-1C-1S\+-
MikrotikCcr1009-7G-1C-1S\+Pc-
MikrotikCcr1009-7G-1C-Pc-
MikrotikCcr1016-12G-
MikrotikCcr1016-12S-1S\+-
MikrotikCcr1036-12G-4S-
MikrotikCcr1036-12G-4S-Em-
MikrotikCcr1036-8G-2S\+-
MikrotikCcr1036-8G-2S\+Em-
MikrotikCcr1072-1G-8S\+-
MikrotikHex-
MikrotikHex Lite-
MikrotikHex Poe-
MikrotikHex Poe Lite-
MikrotikHex S-
MikrotikPowerbox-
MikrotikPowerbox Pro-
MikrotikRb1100Ahx4-
MikrotikRb2011Il-In-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-10364?

CVE-2020-10364 is a vulnerability with a CVSS score of 7.5 (HIGH). The SSH daemon on MikroTik routers through v6.44.3 could allow remote attackers to generate CPU activity, trigger refusal of new authorized connections, and cause a reboot via connect and write system...

How severe is CVE-2020-10364?

CVE-2020-10364 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2020-10364?

Check the references section above for vendor advisories and patch information. Affected products include: Mikrotik Routeros, Mikrotik Ccr1009-7G-1C-1S\+, Mikrotik Ccr1009-7G-1C-1S\+Pc, Mikrotik Ccr1009-7G-1C-Pc, Mikrotik Ccr1016-12G.