Lucene search

K
cve[email protected]CVE-2020-10364
HistoryMar 23, 2020 - 4:15 p.m.

CVE-2020-10364

2020-03-2316:15:13
CWE-770
web.nvd.nist.gov
42
cve-2020-10364
mikrotik
ssh
denial of service
remote attackers
nvd

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.008 Low

EPSS

Percentile

82.0%

The SSH daemon on MikroTik routers through v6.44.3 could allow remote attackers to generate CPU activity, trigger refusal of new authorized connections, and cause a reboot via connect and write system calls, because of uncontrolled resource management.

Affected configurations

NVD
Node
mikrotikrouterosRange6.44.3
AND
mikrotikccr1009-7g-1c-1s\+Match-
OR
mikrotikccr1009-7g-1c-1s\+pcMatch-
OR
mikrotikccr1009-7g-1c-pcMatch-
OR
mikrotikccr1016-12gMatch-
OR
mikrotikccr1016-12s-1s\+Match-
OR
mikrotikccr1036-12g-4sMatch-
OR
mikrotikccr1036-12g-4s-emMatch-
OR
mikrotikccr1036-8g-2s\+Match-
OR
mikrotikccr1036-8g-2s\+emMatch-
OR
mikrotikccr1072-1g-8s\+Match-
OR
mikrotikhexMatch-
OR
mikrotikhex_liteMatch-
OR
mikrotikhex_poeMatch-
OR
mikrotikhex_poe_liteMatch-
OR
mikrotikhex_sMatch-
OR
mikrotikpowerboxMatch-
OR
mikrotikpowerbox_proMatch-
OR
mikrotikrb1100ahx4Match-
OR
mikrotikrb1100ahx4Match-dude
OR
mikrotikrb2011il-inMatch-
OR
mikrotikrb2011il-rmMatch-
OR
mikrotikrb2011ils-inMatch-
OR
mikrotikrb2011uias-inMatch-
OR
mikrotikrb2011uias-rmMatch-
OR
mikrotikrb3011uias-rmMatch-
OR
mikrotikrb4011igs\+rmMatch-

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.008 Low

EPSS

Percentile

82.0%

Related for CVE-2020-10364