While the list may not be complete, the known devices affected by VPNFilter are Linksys, MikroTik, NETGEAR and TP-Link networking equipment in the small and home office (SOHO) space, as well at QNAP network-attached storage (NAS) devices.
The Talos blog indicates they reached out to Mikrotik about the problem, so I’m confident that mrz would be aware of any and all developments related to this exploit.
Cisco informed us on May 22nd of 2018, that a malicious tool was found on several manufacturer devices, including three devices made by MikroTik. We are highly certain that this malware was installed on these devices through a vulnerability in MikroTik RouterOS software, which was already patched by MikroTik in March 2017. Simply upgrading RouterOS software deletes the malware, any other 3rd party files and closes the vulnerability. Let us know if you need more details. Upgrading RouterOS is done by a few clicks and takes only a minute.
We have a CCR 1036 running 6.40.5 - and has been for some months
Today we got an abuse report for this router
So clearly there is a problem at least up to 6.40.5
Can Mikrotik please respond here?
Then add extra input rules if needed (e.g. allow ssh on the wan port from a given management address-list), which I believe secures things enough to not be a major concern if I can’t keep a given router uptodate (I’ve got some in horrendous places that are 3 days travel away at best, really don’t like risking bricking them!)
Of course it only takes 1 infected box internally to bypass that. I’ve locked down access to only specific management address ranges in the past, but have been burnt when I’ve had routing protocols break, and the only way to get in is to ssh from the next hop, which I neglected to put in the config. I wonder if a “allow TTL=254 on wan” would do the trick as a template.
With those precautions, the risk from zero-day exploits is significantly minimized.