MikroTik ·ÓÉÆ÷¶à¸öÎó²îÇ徲ͨ¸æ

Ðû²¼Ê±¼ä 2019-10-31

Îó²î±àºÅºÍ¼¶±ð


CVE±àºÅ£ºCVE-2019-3976 £¬£¬£¬£¬£¬£¬£¬Î£ÏÕ¼¶±ð£º¸ßΣ £¬£¬£¬£¬£¬£¬£¬CVSS·ÖÖµ£º¹Ù·½Î´ÆÀ¶¨

CVE±àºÅ£ºCVE-2019-3977 £¬£¬£¬£¬£¬£¬£¬Î£ÏÕ¼¶±ð£º¸ßΣ £¬£¬£¬£¬£¬£¬£¬CVSS·ÖÖµ£º¹Ù·½Î´ÆÀ¶¨

CVE±àºÅ£ºCVE-2019-3978 £¬£¬£¬£¬£¬£¬£¬Î£ÏÕ¼¶±ð£º¸ßΣ £¬£¬£¬£¬£¬£¬£¬CVSS·ÖÖµ£º¹Ù·½Î´ÆÀ¶¨

CVE±àºÅ£ºCVE-2019-3979 £¬£¬£¬£¬£¬£¬£¬Î£ÏÕ¼¶±ð£º¸ßΣ £¬£¬£¬£¬£¬£¬£¬CVSS·ÖÖµ£º¹Ù·½Î´ÆÀ¶¨


Ó°Ïì°æ±¾


RouterOS Stable 6.45.6 and below

RouterOS Long-term 6.44.5 and below


Îó²î¸ÅÊö


MikroTik RouterOSÊÇÀ­ÍÑάÑÇMikroTik¹«Ë¾µÄÒ»Ì×»ùÓÚLinux¿ª·¢µÄ·ÓÉÆ÷²Ù×÷ϵͳ¡£¡£¡£¡£¡£¸Ãϵͳ¿É°²ÅÅÔÚPCÖÐ £¬£¬£¬£¬£¬£¬£¬Ê¹ÆäÌṩ·ÓÉÆ÷¹¦Ð§¡£¡£¡£¡£¡£


MikroTik ·ÓÉÆ÷Öб»ÆØ¶à¸öÎó²î £¬£¬£¬£¬£¬£¬£¬¿Éµ¼Ö¹¥»÷Õß»ñµÃºóÃÅ¡£¡£¡£¡£¡£¸ÃʹÓÃÁ´Ê¼ÓÚ DNS Ͷ¶¾ £¬£¬£¬£¬£¬£¬£¬È»ºó½µ¼¶Ëù×°ÖÃµÄ MikroTik RouterOS Èí¼þµÄ°æ±¾ £¬£¬£¬£¬£¬£¬£¬×îÖÕÆôÓúóÃÅ¡£¡£¡£¡£¡£


Îó²î¼òÊöÈçÏ£º


CVE-2019-3976 ·¾¶±éÀúÎó²î £¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÔ´ÓÚÍøÂçϵͳ»ò²úƷδÄÜ׼ȷµØ¹ýÂË×ÊÔ´»òÎļþ·¾¶ÖеÄÌØÊâÔªËØ¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉʹÓøÃÎó²î»á¼ûÊÜÏÞĿ¼֮ÍâµÄλÖᣡ£¡£¡£¡£


CVE-2019-3977 ¸ÃÎó²îÔ´ÓÚ³ÌÐòûÓгä·ÖÑéÖ¤¸üаüÏÂÔØµÄȪԴ¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉʹÓøÃÎó²î»ñȡϵͳËùÓеÄÓû§Ãû³ÆºÍÃÜÂë¡£¡£¡£¡£¡£


CVE-2019-3978 ¹¥»÷Õ߿ɽèÖú8291¶Ë¿ÚʹÓøÃÎó²î¾ÙÐÐDNSÅÌÎÊ £¬£¬£¬£¬£¬£¬£¬¿ÉÄÜÔì³É»º´æÖж¾¡£¡£¡£¡£¡£


CVE-2019-3979 Ô¶³Ì¹¥»÷Õ߿ɽèÖú¶ñÒâµÄÏìӦʹÓøÃÎó²îÎÛȾ·ÓÉÆ÷µÄDNS»º´æ¡£¡£¡£¡£¡£


Ñо¿Ö°Ô±½¨Òé½ûÓÃWinbox £¬£¬£¬£¬£¬£¬£¬¶ø¸ÄÓÃSSH £¬£¬£¬£¬£¬£¬£¬µ«ÒѾ­·¢Ã÷Áè¼Ý50Íò¸öWinboxʵÀýÃæÏò»¥ÁªÍø¡£¡£¡£¡£¡£


Îó²îÑéÖ¤


ͨ¹ýʹÓÃÒÔÉÏÎó²î £¬£¬£¬£¬£¬£¬£¬Î´ÂÄÀúÖ¤µÄÔ¶³Ì¹¥»÷ÕßÄܹ»»á¼û·ÓÉÆ÷ÉϵĶ˿Ú8291 £¬£¬£¬£¬£¬£¬£¬Ö´ÐÐ RouterOS ½µ¼¶ £¬£¬£¬£¬£¬£¬£¬ÖØÐÂÉèÖÃϵͳÃÜÂë²¢¿ÉÄÜ»ñµÃ root shell¡£¡£¡£¡£¡£


Îó²îʹÓÃÀú³ÌÈçÏ£º


1. DNS»º´æÖж¾


DNSЧÀÍÆ÷ÔÚĬÈϽûÓõÄÇéÐÎÏÂÈÔÓÐÆä×ÔÉíµÄDNS»º´æ £¬£¬£¬£¬£¬£¬£¬DNS²éÕÒÓÉ¡°ÆÊÎöÆ÷¡±¶þ½øÖÆÎļþ´¦Öóͷ£ £¬£¬£¬£¬£¬£¬£¬¸Ã¶þ½øÖÆÎļþÊǹҽÓÔÚRouterOSµÄWinboxЭÒéÖУ»£»£»£»£»£»£»


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

½ûÓõÄDNSЧÀÍÆ÷


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

DNS»º´æ


·¢Ë͵½Winbox¶Ë¿ÚµÄÐÂÎÅ¿ÉÒÔ·¢Ë͵½²î±ðµÄ¶þ½øÖÆÎļþ¼°ÆÊÎöÆ÷£»£»£»£»£»£»£»


È»ºóŲÓÃÈçÏÂͼƬÖеÄÈýÌõÏÂÁ3 £¬£¬£¬£¬£¬£¬£¬4 £¬£¬£¬£¬£¬£¬£¬6£©¾ÍÄÜÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³ÌÓû§Í¨¹ý·ÓÉÆ÷Ïò×Ô¼ºÑ¡ÔñµÄDNSЧÀÍÆ÷·¢ËÍDNSÇëÇ󣻣»£»£»£»£»£»


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

ÏÂÁî3¡¢4¡¢6


ʹÓÃ×Ô½ç˵µÄ¶ñÒâDNSЧÀÍÆ÷ £¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ½«Ò»ÏµÁжñÒâIPµØµã£¨°üÀ¨ÏÂÔØµØµã£©Ð´È뵽·ÓÉÆ÷µÄ»º´æÖÐ £¬£¬£¬£¬£¬£¬£¬µ±Â·ÓÉÆ÷Éý¼¶Ê± £¬£¬£¬£¬£¬£¬£¬½«×ªµ½¹¥»÷ÕߵĶñÒâÕ¾µã £¬£¬£¬£¬£¬£¬£¬ÆäÌṩRouterOSµÄÔçÆÚ°æ±¾¡£¡£¡£¡£¡£


2. ÖÎÀíÔ±Éí·ÝµÇ¼


´Ó6.43°æ×îÏÈ £¬£¬£¬£¬£¬£¬£¬MikroTikÃÜÂë´¦Öóͷ£»úÖÆ×öÁ˸ü¸Ä £¬£¬£¬£¬£¬£¬£¬ÔÚMikroTikµÄÏà¹Ø±ä»»ÈÕÖ¾ÖУº¡°½µ¼¶µ½6.43֮ǰµÄÈκΰ汾 £¬£¬£¬£¬£¬£¬£¬½«É¨³ýËùÓÐÓû§ÃÜÂë²¢ÔÊÐíÎÞÃÜÂëÉí·ÝÑéÖ¤¡±¡£¡£¡£¡£¡£


Ñо¿Ö°Ô±Ëµ£º¡°µ±Óû§×°Öá®Ð¸üС¯Ê± £¬£¬£¬£¬£¬£¬£¬Èƹýեȡͨ¹ý¸üнµ¼¶µÄͨÀýÂß¼­ £¬£¬£¬£¬£¬£¬£¬²¢½µ¼¶µ½RouterOS 6.41.4 £¬£¬£¬£¬£¬£¬£¬ÓÉ´ËÖÎÀíÔ±ÃÜÂëÖØÖõ½ÁËĬÈϵĿÕÃÜÂë £¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃÖÎÀíÔ±Éí·ÝµÇ¼¡±¡£¡£¡£¡£¡£


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

Óû§¼ì²é¸üÐÂÏÔʾchangelog


3. ºóÃÅÆôÓÃÎļþ/Ŀ¼


¡°6.41.4°æ±¾ÏµÍ³±£´æºóÃÅ £¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøúóÃÅ»ñÈ¡ÍêÕûµÄbusybox shell¡± £¬£¬£¬£¬£¬£¬£¬¡°6.41.4µÄºóÃÅÆôÓÃÎļþ»òĿ¼¾ÍÊÇ/pckg/option £¬£¬£¬£¬£¬£¬£¬Ö»Òª¸ÃÎļþ»òĿ¼±£´æ £¬£¬£¬£¬£¬£¬£¬¾Í¿ÉÒÔÆôÓúóÃÅ¡± £¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÌåÏÖ¡£¡£¡£¡£¡£


4. ½¨Éèí§ÒâĿ¼


Ñо¿Ö°Ô±ÔÚÈí¼þ°üÖз¢Ã÷ÁíÍâÒ»¸öÎó²î £¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îʹ¹¥»÷Õß¿ÉÒÔÔÚϵͳÉϽ¨Éèí§ÒâĿ¼¡£¡£¡£¡£¡£MikroTikÔÚ¸üÐÂʱ´ú´¦Öóͷ£.NPKÎļþµÄ·½·¨£ºÒ»µ©Óöµ½ÊðÃû²¿·Ö £¬£¬£¬£¬£¬£¬£¬½«×èÖ¹Èí¼þ°üÖÐSHA-1µÄÅÌËã £¬£¬£¬£¬£¬£¬£¬ÕâÖÖ´¦Öóͷ£·½·¨µ¼ÖÂÖ»ÆÊÎö²¿·ÖÐÅÏ¢×Ö¶Î £¬£¬£¬£¬£¬£¬£¬¿ÉÓÃÓÚÔÚ´ÅÅÌÉϵÄÈκÎλÖý¨ÉèĿ¼¡£¡£¡£¡£¡£


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

Ñо¿Ö°Ô±±àдµÄÒ»¸öÃûΪoption_npkµÄ¹¤¾ß


ÐÞ¸´½¨Òé


ÏÖÔÚ³§ÉÌÒÑÐû²¼Éý¼¶²¹¶¡ÒÔÐÞ¸´Îó²î £¬£¬£¬£¬£¬£¬£¬ÏêÇéÇë¹Ø×¢³§ÉÌÖ÷Ò³£ºhttps://mikrotik.com¡£¡£¡£¡£¡£


²Î¿¼Á´½Ó


https://www.securityweek.com/mikrotik-router-vulnerabilities-can-lead-backdoor-creation