The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a stack-based buffer overflow when processing NetBIOS session request messages. A remote unauthenticated attacker can send a specially crafted NetBIOS session request message with malformed NetBIOS names, trigger stack-based buffer overflow and cause denial of service conditions or execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to gain full access to the affected router but requires that SMB service is running.
From MikroTik support: [quote=normis post_id=648933 time=1521450665 user_id=5]
Please note, that SMB service had to be enabled on the LAN side, and only the LAN users could exploit this.
[/quote]
No. MikroTik devices have firewall on WAN by default. Also, since you have to explicitly enable SMB support, normally a person wouldn’t configure it for access from WAN …
Hi,
Today all our customers who has puplic ip with Mikrotik device stop working. When we check to understand what happen, we see that ethernet interfaces of these devices are not working , and some SXT reseted. İs that related with this vulnerabilities ?
Please stop posting in all topics that are not related to your question. There is a high likelihood you suffered ESD damage due to static discharge in the atmosphere. Not all problems are caused by “evil hackers”
yes you are right Im sorry for that. so I opened new topic and also sent mail to support. I dont think that ESD damage due to static discharge, I have many Mikrotik device on customers but only devices with puplic ip address failed and all of them down yesterday, nearly 50 device with same problem. ethernet interface comes for 5-10 seconds than goes. netinstall also not work.