Fixed in 6.42.12, 6.43.12 and 6.44
There is no troll feeding. @mrz admitted it was fixed so it is confirmed issue. (if there is not and issue, there wouldn't need to be a fix, right?)Until then, all this rhetoric does is feed trolls --- don't become one ...............
What's new in 6.43.12 (2019-Feb-08 11:46):
*) winbox - improvements in connection handling to router with open winbox service;
MAJOR CHANGES IN v6.43.12:
----------------------
!) winbox - fixed vulnerability that allowed to gain limited access to an unsecured router; (Details will be published in 90 days)
----------------------
What's new in 6.43.12 (2019-Feb-08 11:46):
*) winbox - improvements in connection handling to router for morons that do not secure their winbox properly or upgrade their firmware;
Appropriate changelog (partially inspired by 6.42.1 and 6.42.7 which both fixed similar vulnerabilities):MAJOR CHANGES IN v6.43.12:
----------------------
!) winbox - fixed vulnerability that allowed to gain limited access to an unsecured router; (Details will be published in 90 days),
! winbox - added capability to bitcoin mine any devices behind an improperly secured router in order to pay for the aforementioned fixes
----------------------
Software with fixed bug is better than software without fixed bug, you can't say that it's not an improvement, that description is 100% true. And MikroTik's approach to releasing details is well-thought strategy, carefully crafted to avoid both spreading unnecessary panic among users and tipping off the bad guys at the same time. It's all nice and smooth, "improvement" sounds interesting to users, but not too interesting to bad guys. If they'd use "vulnerability", it scares users and attracts bad guys. Although it's not yet clear how it will work in long term, it's possible that RouterOS users could eventually become terrified by word "improvement".(I hate to admit it, but I actually love this play with words.. "improvement" yeaaaah )
I see where you are coming from, so I fixed it for ya.................
I disagree with how you frame this release notes (it's a GOOD thing that we don't know that there is a security hole in production systems!), and in bigger picture lack of transparency, especially for security sensitive components: routers.Software with fixed bug is better than software without fixed bug, you can't say that it's not an improvement, that description is 100% true. And MikroTik's approach to releasing details is well-thought strategy, carefully crafted to avoid both spreading unnecessary panic among users and tipping off the bad guys at the same time. It's all nice and smooth, "improvement" sounds interesting to users, but not too interesting to bad guys. If they'd use "vulnerability", it scares users and attracts bad guys. Although it's not yet clear how it will work in long term, it's possible that RouterOS users could eventually become terrified by word "improvement".
Absolutely agree, however, I wonder why would they do it... This is pure hypothesis: Maybe Tenable originally agreed to keep it secret for some period of time, but after they saw that the security fix was silently released as "improvement", they decided to inform users with full disclosure. If that is the case, I bet Mikrotik will not dare to do the same next time.To me Tenable went public to soon.
That's why I love the choice of words... It is true, yet very misleading.you can't say that it's not an improvement, that description is 100% true
Can't talk for others but I will be very cautious.users could eventually become terrified by word "improvement".
Not cool mate. Not cool. If you meant it as a joke, couple of smileys would be appreciated. I am up since 4am so my sense of humor might be affected a bit for today.I see where you are coming from, so I fixed it for ya.................
Agree. Changelog should reflect the fact that this is a security fix rather claiming it's some sort of "improvement"... I just finished reading and I am speechless...
@op: thanks for sharing
@mikrotik: seriously gents? This is not "improvements in connection handling to router with open winbox service" . This is another severe vulnerability! I don't actually mind that there was a vulnerability - stuff happens. What makes me angry is the fact that it was not disclosed and the changelog contains deliberate lie.
pe1chl called this in post #2 of the 6.43.12 thread so nice catch by him. It's a shame but people who want to get a heads up on recently disclosed RouterOS vulnerabilities can't reliably get that here. You'd be much better off going to the NetSec subReddit for example, where they've quickly posted all the recent stuff the Tenable guy's been up to. Even though it'll probably mean many more security patches are coming, I think it's great that Zerodium started a bug bounty program for Mikrotik. It's not like the bad guys don't know, they're just providing incentives for full disclosure. So patch early and patch often my friends!Agree. Changelog should reflect the fact that this is a security fix rather claiming it's some sort of "improvement"
That was a bit of a dick move, to publish it just days after release of the version with the patch.
I understand that Mikrotik wants to speak in a positive way about this but why include the in bold words?
I assuming that Tenable is also interested in that a vulnarbility is patched and implemented and patched and no one is using the updated version. Is not a game who can piss the longest distance and Tenable and Mikrotik have to trust each other in this.@msatterAbsolutely agree, however, I wonder why would they do it... This is pure hypothesis: Maybe Tenable originally agreed to keep it secret for some period of time, but after they saw that the security fix was silently released as "improvement", they decided to inform users with full disclosure. If that is the case, I bet Mikrotik will not dare to do the same next time.To me Tenable went public to soon.
Fact is, that without Tenable's post, people would not be aware of this vulnerability and many of them might not upgrade until another significant security patch come...
So it was already fixed before Tenable contacted Mikrotik?Because the most common question is, when you will fix this. It's already fixed.
That is not a direct answer to my question however a indirect one, like this will do.It was fixed before Tenable made the issue public. MikroTik and Tenable gave users time to upgrade before making any announcements.
With the WinBox service exploit we were told that an address whitelist on the service was enough to block anything bad. I am HOPING this is true for this exploit too, but I don't see anyone mentioning it.Are there still people dumb enough to expose winbox to anything but an isolated management vlan? Don't do it, the winbox protocol obviously is not designed to be secure.
/ip service
set winbox address=a.b.c.d/32
Would love if that information was actually given in the blog post too, so we knew if we were vulnerable or not.
That is wonderful news, first good news I hear all day.Yes, "service" menu limitation will protect you, the service "winbox" affects winbox/dude/tik-app all at the same time.
Unfortunately that isn't how it works. Zerodium will pay for Mikrotik exploits and then sell them to governments and intelligence agencies to compromise foreign networks, spy on people, etc. They definitely aren't reporting them to Mikrotik to be fixed!I think it's great that Zerodium started a bug bounty program for Mikrotik. It's not like the bad guys don't know, they're just providing incentives for full disclosure. So patch early and patch often my friends!
We can only thank good people like the Tenable guys, who report to us first.
..I see where you are coming from, so I fixed it for ya.................
What's new in 6.43.12 (2019-Feb-08 11:46):
*) winbox - improvements in connection handling to router for morons that do not secure their winbox properly or upgrade their firmware;
Appropriate changelog (partially inspired by 6.42.1 and 6.42.7 which both fixed similar vulnerabilities):
MAJOR CHANGES IN v6.43.12:
----------------------
!) winbox - fixed vulnerability that allowed to gain limited access to an unsecured router; (Details will be published in 90 days),
! winbox - added capability to bitcoin mine any devices behind an improperly secured router in order to pay for the aforementioned fixes
----------------------
On that we agree, and I didn't mean to make it sound like Zerodium (or other 0day aggregators like them) provides *anything* for free to anyone. My hope is that this news gives Mikrotik the incentive to discover the vulnerabilities and provide full disclosure, either by themselves or through 3rd party audits of the source code. I hope this is happening and that Mikrotik doesn't just expect white hats to do the work. If it hadn't been clear to Mikrotik that they are a target, it's news like this that should make it crystal.Unfortunately that isn't how it works. Zerodium will pay for Mikrotik exploits and then sell them to governments and intelligence agencies to compromise foreign networks, spy on people, etc. They definitely aren't reporting them to Mikrotik to be fixed!I think it's great that Zerodium started a bug bounty program for Mikrotik. It's not like the bad guys don't know, they're just providing incentives for full disclosure. So patch early and patch often my friends!
The first sentence is irrelevant truth and the second one is like a slap in everyone's face.It was fixed before Tenable made the issue public. MikroTik and Tenable gave users time to upgrade before making any announcements.
As mentioned in the blog post, the "Dude Agent" is part of the WinBox service. It is used to allow the Dude Server to relay probes through a firewall. But the "Dude Agent" is active always, even if you don't have a Dude server anywhere in your network.Is it only specific to dude agent binary? To remediate is it enough to have dude agent not installed or not enabled?
(of course Winbox port is closed to the internet, but I don't want my LANs to be able to use it, dude is installed, but not enabled)
The article says it's only agent, but I'd appreciate explicit confirmation from Mikrotik. Quote: "However, one of the binaries that handles the probes (agent) fails to verify whether the remote user is authenticated."
Thank you,
I'm not sure this statement is accurate.As mentioned in the blog post, the "Dude Agent" is part of the WinBox service. It is used to allow the Dude Server to relay probes through a firewall. But the "Dude Agent" is active always, even if you don't have a Dude server anywhere in your network.
We didn't hear of any large scale attack on Winbox vulnerability (CVE-2018-14847) until 6 month AFTER the fix was released...But we haven't yet heard of any large scale attacks using this vulnerability.
I see. That is definitely wrong documentation. Maybe just outdated? Thanks for pointing that out.it is possible to install the Dude Server/Agent onto a RouterOS device. To do this, you need to install the Dude package onto RouterOS"
the 6.38 is over 2 years old and since that Winbox vulnerability from last year, I don't expect that anyone will have ROS older than 6.40.8@bugfix or 6.42.1@currentStarting from RouterOS 6.38.x any RouterOS device can be a Dude agent without any installation or configuration required.
Yayyy, finally agreement! High five?Docs are very confusing.
only from the accept list ipsSo, if you don't have allowed addresses in Winbox IP service, but you have an input accept filter rule with address list for 8291, you're vulnerable?
There may be some time you only are able to support a site from remote location.What am I missing here??
For real? Only from them?only from the accept list ipsSo, if you don't have allowed addresses in Winbox IP service, but you have an input accept filter rule with address list for 8291, you're vulnerable?
The sound of sweet pragmatism! I use source address lists for non-sensitive items such as a septic company access to my septic control box.@Redmor: It depends. If you configure firewall to let only specific addresses in, nothing else will pass. But whether traffic that looks as from some address is really from device that legitimately owns that address, that's a different question. E.g. if I whitelist a.b.c.d on my home router, there's nothing easier for my ISP (through which I route all traffic) than to set up device with a.b.c.d and get around (or right through) my filter. There are obvious limits who can do something like that, but if you want it really safe, any IP-based whitelists are not the right way.