We should have automatic security updates. Security updates are different than feature upgrades and for mission critical devices such as routers, security updates should be included.
But officially supported automatic updates would need bigger changes, current release channels are not perfect for this. The “stable” (previously “current”) is out, because it breaks things every now and then. When it happens to few early adopters, it’s not good, but imagine thousands routers all over the world breaking up, it would be some bad publicity. The “long term” (previously “bugfix”) is better, but not completely safe either. Upgrades from a.b.C to a.b.D should be ok, but a.B.x to a.C.x bring bigger changes and something can go wrong (e.g. current bridge/switch changes don’t seem to work for all people).
To make it as safe as possible, there would have to be some “microupdates” with only minimal changes, strictly security-only. But MikroTik can hardly provide them for every version they release.
I updated my Router OS from v6.41. to v643.2, updated winbox to current version, updated admin password, still the hacker was able to get full control of the system locking me out.
It is highly probable that attacker installed some stealth script which allows her to regain control. The only way out is to netinstall router (during that process router’s NAND storage is formatted) and then configure router from scratch. It is vital not to use backup to restore configuration, text export can be handy when configuring … but be careful not to copy any configuration bit for which you’re not sure why it’s there.
hi, we have hundreds of mikrotik cpe with public static ip; fortunately, only a few of them (5) have a ros version afflicted by the vulnerability; they came from the factory with ros 6.40.3 , and a few hours from installation, someone use the vulnerability to change the password and lock us out. In our configuration, we also have a scheduled script that grabs the configuration from one of our servers once a day, but they disable it too…; so my question is, are there any way to bring back the control of these cpes remotely, or the only way to do it is locally with netinstall?
if your user account has been disabled, then Netinstall is the only option.
however, most popular attacks leave the user account open, so try to log in from the local network side.
If it is old RouterOS and you get “bad password” it means you have access to vulnerable winbox service.
All you need to do is try the Proof of Concept: https://github.com/BasuCert/WinboxPoC It is really simple to use, all you need is python3 installed and IP/MAC of the device.
Someone hacked your device? Hack it back for yourself!
I’ve been exposed to this vulnerability until last week. I had the impression that I had the WinBox port closed for WAN. The ISP’s CGNAT rollout without any notification mislead me into thinking that my ports were closed when being scanned from the internet.
I’ve updated the software, but I’m a bit paranoia. How can I make sure that the router’s software/firmware/etc hasn’t been tampered in any way while I was vulnerable, and that there’s backdoor still left opened?