Executive Summary

Informations
Name CVE-2018-7445 First vendor Publication 2018-03-19
Vendor Cve Last vendor Modification 2025-04-03

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 9.8
Base Score 9.8 Environmental Score 9.8
impact SubScore 5.9 Temporal Score 9.8
Exploitabality Sub Score 3.9
 
Attack Vector Network Attack Complexity Low
Privileges Required None User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A buffer overflow was found in the MikroTik RouterOS SMB service when processing NetBIOS session request messages. Remote attackers with access to the service can exploit this vulnerability and gain code execution on the system. The overflow occurs before authentication takes place, so it is possible for an unauthenticated remote attacker to exploit it. All architectures and all devices running RouterOS before versions 6.41.3/6.42rc27 are vulnerable.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7445

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 376

SAINT Exploits

Description Link
MicroTik RouterOS SMB buffer overflow More info here

Snort® IPS/IDS

Date Description
2018-05-23 MikroTik RouterOS buffer overflow attempt
RuleID : 46076-community - Revision : 2 - Type : NETBIOS
2018-04-27 MikroTik RouterOS buffer overflow attempt
RuleID : 46076 - Revision : 2 - Type : NETBIOS

Nessus® Vulnerability Scanner

Date Description
2018-03-22 Name : The remote networking device is affected by a buffer overflow vulnerability.
File : mikrotik_6_41_3.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://seclists.org/fulldisclosure/2018/Mar/38
http://www.securityfocus.com/bid/103427
https://www.coresecurity.com/advisories/mikrotik-routeros-smb-buffer-overflow
https://www.exploit-db.com/exploits/44290/
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
Date Informations
2025-05-27 01:14:30
  • Multiple Updates
2025-02-07 21:21:26
  • Multiple Updates
2025-01-27 21:21:06
  • Multiple Updates
2024-11-28 13:22:48
  • Multiple Updates
2024-08-02 13:00:17
  • Multiple Updates
2024-08-02 01:17:08
  • Multiple Updates
2024-02-02 01:58:18
  • Multiple Updates
2024-02-01 12:16:09
  • Multiple Updates
2023-09-05 12:56:15
  • Multiple Updates
2023-09-05 01:15:51
  • Multiple Updates
2023-09-02 12:55:32
  • Multiple Updates
2023-09-02 01:16:08
  • Multiple Updates
2023-08-12 12:59:20
  • Multiple Updates
2023-08-12 01:15:25
  • Multiple Updates
2023-08-11 12:53:16
  • Multiple Updates
2023-08-11 01:15:51
  • Multiple Updates
2023-08-06 12:51:42
  • Multiple Updates
2023-08-06 01:15:22
  • Multiple Updates
2023-08-04 12:51:56
  • Multiple Updates
2023-08-04 01:15:30
  • Multiple Updates
2023-07-14 12:51:56
  • Multiple Updates
2023-07-14 01:15:28
  • Multiple Updates
2023-03-29 01:53:20
  • Multiple Updates
2023-03-28 12:15:48
  • Multiple Updates
2022-10-11 12:46:29
  • Multiple Updates
2022-10-11 01:15:27
  • Multiple Updates
2021-05-04 13:20:20
  • Multiple Updates
2021-04-22 02:34:38
  • Multiple Updates
2020-05-24 01:26:39
  • Multiple Updates
2020-05-23 02:20:07
  • Multiple Updates
2020-05-23 01:19:11
  • Multiple Updates
2018-11-22 12:09:31
  • Multiple Updates
2018-04-24 21:19:46
  • Multiple Updates
2018-04-06 21:19:47
  • Multiple Updates
2018-03-21 09:19:14
  • Multiple Updates
2018-03-20 00:19:39
  • First insertion