Community discussions

MikroTik App
 
User avatar
dlynes
newbie
Topic Author
Posts: 32
Joined: Tue Apr 12, 2016 9:08 pm
Location: Hamilton, Canada
Contact:

Fix for CVE-2019-14899?

Fri Dec 06, 2019 5:25 am

Is there a fix in the works for CVE-2019-14899?

For more information, please see:
https://linux.slashdot.org/story/19/12/ ... onnections

and

https://cve.mitre.org/cgi-bin/cvename.c ... 2019-14899

and details of the exploit at:

http://qntra.net/2019/12/vpn-breaking-z ... ms-burned/

Daniel
 
laverdiy
Trainer
Trainer
Posts: 4
Joined: Mon Jun 05, 2017 11:01 pm

Re: Fix for CVE-2019-14899?

Fri Dec 06, 2019 6:08 pm

Thanks for posting this, I was about to start a new thread myself when I saw yours. I'm surprised to see nobody jumping out the windows left and right, this is a serious vulnerability. Any official news on this Mikrotik people ?
 
User avatar
macgaiver
Forum Guru
Forum Guru
Posts: 1764
Joined: Wed May 18, 2005 5:57 pm
Location: Sol III, Sol system, Sector 001, Alpha Quadrant

Re: Fix for CVE-2019-14899?

Fri Dec 06, 2019 6:11 pm

Good that RouterOS v6 use relatively old Linux Kernel that nobody cares about anymore. :)
 
R1CH
Forum Guru
Forum Guru
Posts: 1101
Joined: Sun Oct 01, 2006 11:44 pm

Re: Fix for CVE-2019-14899?

Fri Dec 06, 2019 6:36 pm

I wouldn't worry about this one. This requires a "network adjacent attacker" (layer 2), so why do you have attackers next to your router? If you're seriously worried about this, turn on strict reverse-path filtering and block private IP ranges from WAN interfaces (which is a good practice regardless).
 
laverdiy
Trainer
Trainer
Posts: 4
Joined: Mon Jun 05, 2017 11:01 pm

Re: Fix for CVE-2019-14899?

Fri Dec 06, 2019 7:22 pm

I don't mean to be rude but with attacks coming from so many different vectors in our modern world, I don't consider the LAN interfaces as the "safe side" anymore. Vulnerable stuff is flying off the shelves and popping up in our "trusted" networks, as we all know. Pivoting off these things to launch layer 2 attacks can be trivial at times, which is why I believe this vulnerability deserves a bit of our attention.
 
R1CH
Forum Guru
Forum Guru
Posts: 1101
Joined: Sun Oct 01, 2006 11:44 pm

Re: Fix for CVE-2019-14899?

Fri Dec 06, 2019 7:27 pm

If you have untrusted devices on your layer 2 network then they can easily ARP spoof, DNS spoof, etc and do a full MITM on you much more easily than exploiting this vulnerability.
 
Sob
Forum Guru
Forum Guru
Posts: 9121
Joined: Mon Apr 20, 2009 9:11 pm

Re: Fix for CVE-2019-14899?

Fri Dec 06, 2019 7:52 pm

As I understand it, it's really more misconfiguration than anything else. You have some remote network reachable over VPN. And attacker connected to your other interface (e.g. WAN, after conquering ISP's network), can send spoofed packets from remote network's range. And router will accept them, because why wouldn't it, that could be perfectly valid asymmetric routing config. If it's not, then there should be strict RP filter and problem solved.

Trouble is when you can't use strict RP filter, e.g. in multi-WAN config. There's loose one, but I'm not sure if it actually does anything useful. RouterOS manual says that it's RFC3704's Loose Reverse Path, but the description there is not very convincing. If I'm not misintepreting the part about default route, it sounds that if there's one, it will allow everything. I'll have to test that, or someone who knows better can save me some time and tell me.
 
User avatar
normis
MikroTik Support
MikroTik Support
Posts: 26380
Joined: Fri May 28, 2004 11:04 am
Location: Riga, Latvia

Re: Fix for CVE-2019-14899?

Wed Dec 11, 2019 11:20 am

In RouterOS you can turn on reverse path filtering:
/ip settings set rp-filter=yes

Normally, RouterOS default firewall protects you anyway.
 
mbovenka
Member
Member
Posts: 343
Joined: Mon Oct 14, 2019 10:14 am

Re: Fix for CVE-2019-14899?

Wed Dec 11, 2019 12:20 pm

In RouterOS you can turn on reverse path filtering:
/ip settings set rp-filter=yes

Shouldn't that be '/ip settings set rp-filter=strict', Normis? Or are they synonyms?
 
User avatar
normis
MikroTik Support
MikroTik Support
Posts: 26380
Joined: Fri May 28, 2004 11:04 am
Location: Riga, Latvia

Re: Fix for CVE-2019-14899?

Wed Dec 11, 2019 1:37 pm

My mistake. Strict. It's the only option there

Who is online

Users browsing this forum: GoogleOther [Bot], robibert, ZeeBOB and 124 guests