{"uuid": "21112b7d-ca70-4d68-aa61-6cd9c5a4e41b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-7445", "type": "published-proof-of-concept", "source": "https://t.me/information_security_channel/14482", "content": "The bottom line is that MikroTik is quick fix to issues it knows about, but prefers to maintain a low profile over those problems. The danger here is that existing customers might not be aware of the issues, and be in no hurry to upgrade. MikroTik customers should be aware that a proven proof of concept exploit for vulnerability CVE-2018-7445 is in the public domain, and the 'patch' for this exploit is to upgrade RouterOS to version 6.41.3.\nRelated: New Mirai-Linked IoT Botnet Emerges\u00a0 (https://www.securityweek.com/new-mirai-linked-iot-botnet-emerges)\nRelated: CIA Router Hacking Tool Exposed by WikiLeaks\u00a0 (https://www.securityweek.com/cia-router-hacking-tool-exposed-wikileaks)", "creation_timestamp": "2018-03-16T14:31:38.000000Z"}