why in jesus name would you turn that on?

On Mon, Mar 26, 2018 at 8:40 PM, Adam Moffett <dmmoff...@gmail.com> wrote:

> If an outsider can't hit the http service on your router then you should
> be ok.  You'd also be ok if you're keeping up your ROS version on either
> the "current" or "bugfix" track.
>
> The second vulnerability I mentioned is only relevant if you've turned on
> the SMB service which is off by default.
>
> -Adam
>
>
> ------ Original Message ------
> From: "Steve Jones" <thatoneguyst...@gmail.com>
> To: af@afmug.com
> Sent: 3/26/2018 9:28:47 PM
> Subject: Re: [AFMUG] Mikrotik vulnerabilities
>
> AFAIK (assuming my firewall mastery isnt as awful as i think it is) I have
> a drop all input with an office ACL and allow connected winbox, but i do
> use romon with passwords. that should essentially "protect" shouldnt it?
>
> On Mon, Mar 26, 2018 at 8:24 PM, Adam Moffett <dmmoff...@gmail.com> wrote:
>
>> I'm sure everyone here has a super duper uber secure network and never
>> has to worry about something like this:
>> http://seclist.us/chimayred-reverse-engineering-of-mikrotik-
>> exploits-from-vault-7-cia-leaks.html
>>
>> That info is from January.  If you have a MIPS BE or x86 mikrotik on ROS
>> 6.38.4 or lower and have the http service exposed to the world then you
>> could be hit by this.  The remotely executable code could be anything, even
>> a remote shell which the attacker can use for any kind of additional
>> ongoing nonsense.  Their CPU usage will show up as "unclassified" in Tool
>> -> Profile.  I plead the 5th on how I know that last part.
>>
>> Also on March 12 they announced a remote exploit in the SMB service.  I
>> don't imagine most of us use the SMB service though.
>>
>
>

Reply via email to