Re: [Mikrotik Users] Exploit in ROS 6.41.3/6.42rc27

2018-08-06 Thread Scott Reed via Mikrotik-users
Right. I wanted to make sure people know that there are lots of things that may or may not be impacted if a device is infected.  You either have to totally delete the configuration and restore from backup or you need to go through every menu item and make sure they have not been changed.

Re: [Mikrotik Users] Exploit in ROS 6.41.3/6.42rc27

2018-08-06 Thread Tim via Mikrotik-users
This has been detected in devices with earlier versions of ROS. From: mikrotik-users-boun...@wispa.org On Behalf Of Scott Reed via Mikrotik-users Sent: Monday, August 6, 2018 5:58 AM To: mikrotik-users@wispa.org Subject: Re: [Mikrotik Users] Exploit in ROS 6.41.3/6.42rc27 It will also

Re: [Mikrotik Users] Exploit in ROS 6.41.3/6.42rc27

2018-08-06 Thread Scott Reed via Mikrotik-users
It will also change device identity, change admin password, add Admin, add 5 firewall filter rules to redirect forward traffic, change DNS server, enable DDNS, add IP Web Proxy rules and more, but that is all I remember off the top of my head. On 8/5/2018 20:57, Bob Pensworth via