From https://www.exploit-db.com/exploits/43317/
EDB-ID: 43317 Author: FarazPajohan Published: 2017-12-11
CVE: CVE-2017-17538 Type: Dos Platform: Hardware
E-DB Verified:  Exploit:  Download / View Raw Vulnerable App: N/A
Yes - that's precisely why the topic says Denial of Service, and not ExploitThis is not an exploit.
No it didn't. From the post and from the link:Yes - that's precisely why the topic says Denial of Service, and not Exploit
Funny how most devices have things like control plane policing, to limit things like this.
Standard firewall prevents this. Even if you need to keep an open interface to the internet, just enable firewall to control connections per second. This is basic stuff.DB Verified:  Exploit
Normis,No it didn't. From the post and from the link:Yes - that's precisely why the topic says Denial of Service, and not Exploit
Funny how most devices have things like control plane policing, to limit things like this.
Standard firewall prevents this. Even if you need to keep an open interface to the internet, just enable firewall to control connections per second. This is basic stuff.DB Verified:  Exploit
What is your proposition? You can't have an apple and eat an apple.....
Normis,
If I'm understanding you right, your solution is disable Fastpath and go onto slow path with firewall rules?
If so, that seems more like a plaster on a festering wound rather than an actual solution to the issue?
Then I would highly recommend adding large red text on your product page and inside winbox that states. "Using fastpath makes our devices insecure, with fastpath enabled, our devices can be taken offline in seconds with a simple icmp flood."You can choose, secure router or fast throughput. You are choosing to disable router security?
Fastpath is not for all situations.
What specifically would you like us to resolve, load of the device when it is doing something? All devices are loaded by all tasks that they perform.
oh I don't know, maybe like expecting their "flagship router (CCR-1072)" to actually act as a secure router with fast throughput. Seems like this should be standard to be honest.What is your proposition? You can't have an apple and eat an apple.
To firewall, or not to firewall, that is the question.
You still need at least basic firewall setup on edge router to protect router itself from external attacks. Firewall router is to protect customer/server subnets.We don't firewall on our BGP peering routers, we firewall where firewalls are suppose to be, like right near the subnets / servers they are design to protect.
On a "guest type network" (where you can expect attackers) you should not allow forged source IP addresses in your firewall!Description:
This could allow attacker(in your lan) to exhaust all available CPU and crash the kernel via a flood of ICMP packets with forged source IP addresses associated with the public Internet without fast connection. If you launch the exploit with local IP addresses, the router can handle the connections.
Or just use ip uprf strict. /ip/setting rp-filter:strictOn a "guest type network" (where you can expect attackers) you should not allow forged source IP addresses in your firewall!Description:
This could allow attacker(in your lan) to exhaust all available CPU and crash the kernel via a flood of ICMP packets with forged source IP addresses associated with the public Internet without fast connection. If you launch the exploit with local IP addresses, the router can handle the connections.
Only allow source addresses in your local subnet. You can make that even more strict by maintaining an address list from your DHCP leases and
only allowing traffic from addresses with a valid lease.