MikroTik ·ÓÉÆ÷¶à¸öÎó²îÇ徲ͨ¸æ
Ðû²¼Ê±¼ä 2019-10-31Îó²î±àºÅºÍ¼¶±ð
CVE±àºÅ£ºCVE-2019-3976£¬£¬£¬£¬£¬£¬£¬Î£ÏÕ¼¶±ð£º¸ßΣ£¬£¬£¬£¬£¬£¬£¬CVSS·ÖÖµ£º¹Ù·½Î´ÆÀ¶¨
CVE±àºÅ£ºCVE-2019-3977£¬£¬£¬£¬£¬£¬£¬Î£ÏÕ¼¶±ð£º¸ßΣ£¬£¬£¬£¬£¬£¬£¬CVSS·ÖÖµ£º¹Ù·½Î´ÆÀ¶¨
CVE±àºÅ£ºCVE-2019-3978£¬£¬£¬£¬£¬£¬£¬Î£ÏÕ¼¶±ð£º¸ßΣ£¬£¬£¬£¬£¬£¬£¬CVSS·ÖÖµ£º¹Ù·½Î´ÆÀ¶¨
CVE±àºÅ£ºCVE-2019-3979£¬£¬£¬£¬£¬£¬£¬Î£ÏÕ¼¶±ð£º¸ßΣ£¬£¬£¬£¬£¬£¬£¬CVSS·ÖÖµ£º¹Ù·½Î´ÆÀ¶¨
Ó°Ïì°æ±¾
RouterOS Stable 6.45.6 and below
RouterOS Long-term 6.44.5 and below
Îó²î¸ÅÊö
MikroTik RouterOSÊÇÀÍÑάÑÇMikroTik¹«Ë¾µÄÒ»Ì×»ùÓÚLinux¿ª·¢µÄ·ÓÉÆ÷²Ù×÷ϵͳ¡£¡£¡£¡£¡£¡£¡£¸Ãϵͳ¿É°²ÅÅÔÚPCÖУ¬£¬£¬£¬£¬£¬£¬Ê¹ÆäÌṩ·ÓÉÆ÷¹¦Ð§¡£¡£¡£¡£¡£¡£¡£
MikroTik ·ÓÉÆ÷Öб»ÆØ¶à¸öÎó²î£¬£¬£¬£¬£¬£¬£¬¿Éµ¼Ö¹¥»÷Õß»ñµÃºóÃÅ¡£¡£¡£¡£¡£¡£¡£¸ÃʹÓÃÁ´Ê¼ÓÚ DNS Ͷ¶¾£¬£¬£¬£¬£¬£¬£¬È»ºó½µ¼¶Ëù×°ÖÃµÄ MikroTik RouterOS Èí¼þµÄ°æ±¾£¬£¬£¬£¬£¬£¬£¬×îÖÕÆôÓúóÃÅ¡£¡£¡£¡£¡£¡£¡£
Îó²î¼òÊöÈçÏ£º
CVE-2019-3976 ·¾¶±éÀúÎó²î£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÔ´ÓÚÍøÂçϵͳ»ò²úƷδÄÜ׼ȷµØ¹ýÂË×ÊÔ´»òÎļþ·¾¶ÖеÄÌØÊâÔªËØ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉʹÓøÃÎó²î»á¼ûÊÜÏÞĿ¼֮ÍâµÄλÖᣡ£¡£¡£¡£¡£¡£
CVE-2019-3977 ¸ÃÎó²îÔ´ÓÚ³ÌÐòûÓгä·ÖÑéÖ¤¸üаüÏÂÔØµÄȪԴ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉʹÓøÃÎó²î»ñȡϵͳËùÓеÄÓû§Ãû³ÆºÍÃÜÂë¡£¡£¡£¡£¡£¡£¡£
CVE-2019-3978 ¹¥»÷Õ߿ɽèÖú8291¶Ë¿ÚʹÓøÃÎó²î¾ÙÐÐDNSÅÌÎÊ£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜÔì³É»º´æÖж¾¡£¡£¡£¡£¡£¡£¡£
CVE-2019-3979 Ô¶³Ì¹¥»÷Õ߿ɽèÖú¶ñÒâµÄÏìӦʹÓøÃÎó²îÎÛȾ·ÓÉÆ÷µÄDNS»º´æ¡£¡£¡£¡£¡£¡£¡£
Ñо¿Ö°Ô±½¨Òé½ûÓÃWinbox£¬£¬£¬£¬£¬£¬£¬¶ø¸ÄÓÃSSH£¬£¬£¬£¬£¬£¬£¬µ«ÒѾ·¢Ã÷Áè¼Ý50Íò¸öWinboxʵÀýÃæÏò»¥ÁªÍø¡£¡£¡£¡£¡£¡£¡£
Îó²îÑéÖ¤
ͨ¹ýʹÓÃÒÔÉÏÎó²î£¬£¬£¬£¬£¬£¬£¬Î´ÂÄÀúÖ¤µÄÔ¶³Ì¹¥»÷ÕßÄܹ»»á¼û·ÓÉÆ÷ÉϵĶ˿Ú8291£¬£¬£¬£¬£¬£¬£¬Ö´ÐÐ RouterOS ½µ¼¶£¬£¬£¬£¬£¬£¬£¬ÖØÐÂÉèÖÃϵͳÃÜÂë²¢¿ÉÄÜ»ñµÃ root shell¡£¡£¡£¡£¡£¡£¡£
Îó²îʹÓÃÀú³ÌÈçÏ£º
1. DNS»º´æÖж¾
DNSЧÀÍÆ÷ÔÚĬÈϽûÓõÄÇéÐÎÏÂÈÔÓÐÆä×ÔÉíµÄDNS»º´æ£¬£¬£¬£¬£¬£¬£¬DNS²éÕÒÓÉ¡°ÆÊÎöÆ÷¡±¶þ½øÖÆÎļþ´¦Öóͷ££¬£¬£¬£¬£¬£¬£¬¸Ã¶þ½øÖÆÎļþÊǹҽÓÔÚRouterOSµÄWinboxÐÒéÖУ»£»£»
½ûÓõÄDNSЧÀÍÆ÷
DNS»º´æ
·¢Ë͵½Winbox¶Ë¿ÚµÄÐÂÎÅ¿ÉÒÔ·¢Ë͵½²î±ðµÄ¶þ½øÖÆÎļþ¼°ÆÊÎöÆ÷£»£»£»
È»ºóŲÓÃÈçÏÂͼƬÖеÄÈýÌõÏÂÁ3£¬£¬£¬£¬£¬£¬£¬4£¬£¬£¬£¬£¬£¬£¬6£©¾ÍÄÜÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÔ¶³ÌÓû§Í¨¹ý·ÓÉÆ÷Ïò×Ô¼ºÑ¡ÔñµÄDNSЧÀÍÆ÷·¢ËÍDNSÇëÇ󣻣»£»
ÏÂÁî3¡¢4¡¢6
ʹÓÃ×Ô½ç˵µÄ¶ñÒâDNSЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ½«Ò»ÏµÁжñÒâIPµØµã£¨°üÀ¨ÏÂÔØµØµã£©Ð´È뵽·ÓÉÆ÷µÄ»º´æÖУ¬£¬£¬£¬£¬£¬£¬µ±Â·ÓÉÆ÷Éý¼¶Ê±£¬£¬£¬£¬£¬£¬£¬½«×ªµ½¹¥»÷ÕߵĶñÒâÕ¾µã£¬£¬£¬£¬£¬£¬£¬ÆäÌṩRouterOSµÄÔçÆÚ°æ±¾¡£¡£¡£¡£¡£¡£¡£
2. ÖÎÀíÔ±Éí·ÝµÇ¼
´Ó6.43°æ×îÏÈ£¬£¬£¬£¬£¬£¬£¬MikroTikÃÜÂë´¦Öóͷ£»úÖÆ×öÁ˸ü¸Ä£¬£¬£¬£¬£¬£¬£¬ÔÚMikroTikµÄÏà¹Ø±ä»»ÈÕÖ¾ÖУº¡°½µ¼¶µ½6.43֮ǰµÄÈκΰ汾£¬£¬£¬£¬£¬£¬£¬½«É¨³ýËùÓÐÓû§ÃÜÂë²¢ÔÊÐíÎÞÃÜÂëÉí·ÝÑéÖ¤¡±¡£¡£¡£¡£¡£¡£¡£
Ñо¿Ö°Ô±Ëµ£º¡°µ±Óû§×°Öá®Ð¸üС¯Ê±£¬£¬£¬£¬£¬£¬£¬Èƹýեȡͨ¹ý¸üнµ¼¶µÄͨÀýÂß¼£¬£¬£¬£¬£¬£¬£¬²¢½µ¼¶µ½RouterOS 6.41.4£¬£¬£¬£¬£¬£¬£¬ÓÉ´ËÖÎÀíÔ±ÃÜÂëÖØÖõ½ÁËĬÈϵĿÕÃÜÂ룬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃÖÎÀíÔ±Éí·ÝµÇ¼¡±¡£¡£¡£¡£¡£¡£¡£
Óû§¼ì²é¸üÐÂÏÔʾchangelog
3. ºóÃÅÆôÓÃÎļþ/Ŀ¼
¡°6.41.4°æ±¾ÏµÍ³±£´æºóÃÅ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøúóÃÅ»ñÈ¡ÍêÕûµÄbusybox shell¡±£¬£¬£¬£¬£¬£¬£¬¡°6.41.4µÄºóÃÅÆôÓÃÎļþ»òĿ¼¾ÍÊÇ/pckg/option£¬£¬£¬£¬£¬£¬£¬Ö»Òª¸ÃÎļþ»òĿ¼±£´æ£¬£¬£¬£¬£¬£¬£¬¾Í¿ÉÒÔÆôÓúóÃÅ¡±£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÌåÏÖ¡£¡£¡£¡£¡£¡£¡£
4. ½¨Éèí§ÒâĿ¼
Ñо¿Ö°Ô±ÔÚÈí¼þ°üÖз¢Ã÷ÁíÍâÒ»¸öÎó²î£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îʹ¹¥»÷Õß¿ÉÒÔÔÚϵͳÉϽ¨Éèí§ÒâĿ¼¡£¡£¡£¡£¡£¡£¡£MikroTikÔÚ¸üÐÂʱ´ú´¦Öóͷ£.NPKÎļþµÄ·½·¨£ºÒ»µ©Óöµ½ÊðÃû²¿·Ö£¬£¬£¬£¬£¬£¬£¬½«×èÖ¹Èí¼þ°üÖÐSHA-1µÄÅÌË㣬£¬£¬£¬£¬£¬£¬ÕâÖÖ´¦Öóͷ£·½·¨µ¼ÖÂÖ»ÆÊÎö²¿·ÖÐÅÏ¢×ֶΣ¬£¬£¬£¬£¬£¬£¬¿ÉÓÃÓÚÔÚ´ÅÅÌÉϵÄÈκÎλÖý¨ÉèĿ¼¡£¡£¡£¡£¡£¡£¡£
Ñо¿Ö°Ô±±àдµÄÒ»¸öÃûΪoption_npkµÄ¹¤¾ß
ÐÞ¸´½¨Òé
ÏÖÔÚ³§ÉÌÒÑÐû²¼Éý¼¶²¹¶¡ÒÔÐÞ¸´Îó²î£¬£¬£¬£¬£¬£¬£¬ÏêÇéÇë¹Ø×¢³§ÉÌÖ÷Ò³£ºhttps://mikrotik.com¡£¡£¡£¡£¡£¡£¡£
²Î¿¼Á´½Ó
https://www.securityweek.com/mikrotik-router-vulnerabilities-can-lead-backdoor-creation