ID

VAR-201702-1059


CVE

CVE-2017-6297


TITLE

MikroTik RouterOS of L2TP Vulnerability to view unencrypted transmission data on the client

Trust: 0.8

sources: JVNDB: JVNDB-2017-002233

DESCRIPTION

The L2TP Client in MikroTik RouterOS versions 6.83.3 and 6.37.4 does not enable IPsec encryption after a reboot, which allows man-in-the-middle attackers to view transmitted data unencrypted and gain access to networks on the L2TP server by monitoring the packets for the transmitted data and obtaining the L2TP secret. MikroTik RouterOS is a routing operating system based on the Linux kernel. MikroTik RouterOS is prone to a security-bypass vulnerability. Successfully exploiting this issue may allow attackers to perform unauthorized actions by conducting a man-in-the-middle attack. This may lead to other attacks. RouterOS 6.83.3 and 6.37.4 are vulnerable; other versions may also be affected. This system turns a PC computer into a professional router. L2TP Client is one of the communication protocol clients

Trust: 2.52

sources: NVD: CVE-2017-6297 // JVNDB: JVNDB-2017-002233 // CNVD: CNVD-2017-02552 // BID: 96447 // VULHUB: VHN-114500

AFFECTED PRODUCTS

vendor:mikrotikmodel:routerosscope:eqversion:6.37.4

Trust: 3.0

vendor:mikrotikmodel:routerosscope:eqversion:6.83.3

Trust: 2.4

vendor:microtikmodel:routerosscope:eqversion:6.83.3

Trust: 0.6

sources: CNVD: CNVD-2017-02552 // JVNDB: JVNDB-2017-002233 // CNNVD: CNNVD-201702-921 // NVD: CVE-2017-6297

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-6297
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-6297
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2017-02552
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201702-921
value: MEDIUM

Trust: 0.6

VULHUB: VHN-114500
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-6297
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-02552
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-114500
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-6297
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-02552 // VULHUB: VHN-114500 // JVNDB: JVNDB-2017-002233 // CNNVD: CNNVD-201702-921 // NVD: CVE-2017-6297

PROBLEMTYPE DATA

problemtype:CWE-311

Trust: 1.1

problemtype:CWE-254

Trust: 0.9

sources: VULHUB: VHN-114500 // JVNDB: JVNDB-2017-002233 // NVD: CVE-2017-6297

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201702-921

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201702-921

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-002233

PATCH

title:Top Pageurl:https://www.mikrotik.com/software

Trust: 0.8

sources: JVNDB: JVNDB-2017-002233

EXTERNAL IDS

db:NVDid:CVE-2017-6297

Trust: 3.4

db:BIDid:96447

Trust: 2.6

db:JVNDBid:JVNDB-2017-002233

Trust: 0.8

db:CNNVDid:CNNVD-201702-921

Trust: 0.7

db:CNVDid:CNVD-2017-02552

Trust: 0.6

db:VULHUBid:VHN-114500

Trust: 0.1

sources: CNVD: CNVD-2017-02552 // VULHUB: VHN-114500 // BID: 96447 // JVNDB: JVNDB-2017-002233 // CNNVD: CNNVD-201702-921 // NVD: CVE-2017-6297

REFERENCES

url:https://blog.milne.it/2017/02/24/mikrotik-routeros-security-vulnerability-l2tp-tunnel-unencrypted-cve-2017-6297/

Trust: 3.1

url:http://www.securityfocus.com/bid/96447

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6297

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-6297

Trust: 0.8

url:http://www.mikrotik.com/software.html

Trust: 0.3

sources: CNVD: CNVD-2017-02552 // VULHUB: VHN-114500 // BID: 96447 // JVNDB: JVNDB-2017-002233 // CNNVD: CNNVD-201702-921 // NVD: CVE-2017-6297

CREDITS

Ryan Milne

Trust: 0.3

sources: BID: 96447

SOURCES

db:CNVDid:CNVD-2017-02552
db:VULHUBid:VHN-114500
db:BIDid:96447
db:JVNDBid:JVNDB-2017-002233
db:CNNVDid:CNNVD-201702-921
db:NVDid:CVE-2017-6297

LAST UPDATE DATE

2024-11-23T22:22:36.360000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-02552date:2017-03-09T00:00:00
db:VULHUBid:VHN-114500date:2019-10-03T00:00:00
db:BIDid:96447date:2017-03-07T01:07:00
db:JVNDBid:JVNDB-2017-002233date:2017-04-05T00:00:00
db:CNNVDid:CNNVD-201702-921date:2019-10-23T00:00:00
db:NVDid:CVE-2017-6297date:2024-11-21T03:29:29.883

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-02552date:2017-03-09T00:00:00
db:VULHUBid:VHN-114500date:2017-02-27T00:00:00
db:BIDid:96447date:2017-02-24T00:00:00
db:JVNDBid:JVNDB-2017-002233date:2017-04-05T00:00:00
db:CNNVDid:CNNVD-201702-921date:2017-02-28T00:00:00
db:NVDid:CVE-2017-6297date:2017-02-27T07:59:00.347