300,000 MikroTik routers are ticking security time bombs, researchers say (2024)

GOT PATCHES? —

Device owners have yet to install patches for 3 high-severity vulnerabilities.

Dan Goodin -

300,000 MikroTik routers are ticking security time bombs, researchers say (1)

As many as 300,000 routers made by Latvia-based MikroTik are vulnerable to remote attacks that can surreptitiously corral the devices into botnets that steal sensitive user data and participate in Internet-crippling DDoS attacks, researchers said.

The estimate, made by researchers at security firm Eclypsium, is based on Internet-wide scans that searched for MikroTik devices using firmware versions known to contain vulnerabilities that were discovered over the past three years. While the manufacturer has released patches, the Eclypsium research shows that a significant proportion of users has yet to install them.

“Given the challenges of updating MikroTik, there are large numbers of devices with these 2018 and 2019 vulnerabilities,” Eclypsium researchers wrote in a post. “Collectively, this gives attackers many opportunities to gain full control over very powerful devices, positioning them to be able to target devices both behind the LAN port as well as target other devices on the Internet.”

Embraced by script kiddies and nation-states alike

The concern is far from theoretical. In early 2018, researchers at security firm Kaspersky said that a powerful nation-state malware called Slingshot, which had gone undetected for six years, initially spread through MikroTik routers. The attacks downloaded malicious files from vulnerable routers by abusing a MikroTik configuration utility known as Winbox, which transferred the payloads from the device file system to a connected computer.

A few months later, researchers at security firm Trustwave discovered two malware campaigns against MikroTik routers after reverse engineering a CIA tool leaked in a WikiLeaks series known as Vault7.

Also in 2018, China's Netlab 360 reported that thousands of MikroTik routers had been swept into a botnet by malware attacking a vulnerability tracked as CVE-2018-14847.

The Eclypsium researchers said that CVE-2018-14847 is one of at least three high-severity vulnerabilities that remains unpatched in the Internet-connected MikroTik devices they tracked. Combined with two other vulnerabilities located in Winbox—CVE-2019-3977 and CVE-2019-3978—Eclypsium found 300,000 vulnerable devices. Once hackers infect a device, they typically use it to launch further attacks, steal user data, or participate in distributed denial-of-service attacks.

The researchers have released a free software tool that people can use to detect if their MikroTik device is either vulnerable or infected. The company also provides other suggestions for locking down the devices. As always, the best way to secure a device is to ensure it’s running the latest firmware. It’s also important to replace default passwords with strong ones and turn off remote administration unless it’s necessary.

300,000 MikroTik routers are ticking security time bombs, researchers say (2024)

FAQs

How secure are MikroTik routers? ›

Although a valid admin account on the router is required to exploit the vulnerability, MikroTik routers are notorious for being easy to hack since they use “admin” as the username by default. Furthermore, MikroTik routers aren't equipped with any controls to detect and prevent brute-force password attacks.

Is MikroTik a Chinese company? ›

MikroTik is a Latvian company which was founded in 1996 to develop routers and wireless ISP systems. MikroTik now provides hardware and software for Internet connectivity in most of the countries around the world.

What is the vulnerability of MikroTik routers? ›

Scale of Vulnerable Routers

As of August 2, 2023, Censys observed that nearly 450,000 hosts exposing MikroTik RouterOS config interfaces were still running versions vulnerable to CVE-2023-30799 – almost half of all the MikroTik config pages that we see on the Internet. The most common versions at risk were 6.48.

How to secure a MikroTik network? ›

Securing Your MikroTik
  1. Change Default Username and Password. ...
  2. Change Password. ...
  3. Access Control by IP Address. ...
  4. Disable Unnecessary Services. ...
  5. Change Default SSH Port. ...
  6. More Secure SSH Access. ...
  7. RouterOS MAC Access Control. ...
  8. Bandwidth Test.
Feb 21, 2024

What is the lifespan of MikroTik router? ›

Re: MTBF of RouterBOARD

From my knowledge MikroTik doesn't have such data (because no official tests are preformed to determine MTBF). However from my observation you can expect around 4-5 years lifetime (for 24x7 scenario). In my opinion 3 years is a sensible rotation period due to technology evolution.

What is the disadvantage of MikroTik? ›

Expensive Load Balancing: Several users have mentioned that load balancing requires multiple MikroTik devices, making the implementation more expensive. This additional cost can be a barrier for small businesses or individuals looking to implement load balancing on their network.

Is MikroTik used in USA? ›

Yes, MikroTik is used in the United States, although it may not be as widely adopted as Cisco in enterprise environments. MikroTik has a growing presence in the US market, particularly among small to medium-sized businesses, ISPs, and networking enthusiasts who value its cost-effective and feature-rich solutions.

Does Amazon use MikroTik? ›

Looks like Amazon uses our products in one of the worlds biggest cloud systems.

Is MikroTik a good router? ›

Mikrotik has a reputation for making highly configurable routers but they also have a higher degree of difficultly in that configuration. Setting a router up for the first time can be a bit intimidating if you have never seen anything like this before. One of the best things about this router is the price.

What is the rating of MikroTik router? ›

PeerSpot users give MikroTik Routers and Switches an average rating of 7.8 out of 10.

Is a router a security risk? ›

When your router is compromised, threat actors can: Steal personally identifiable information (PII) from any device connected to your network and use it for malicious purposes. Access login credentials of user accounts and use them to gain unauthorized access to networks and devices.

How to protect a MikroTik router? ›

Securing your router
  1. Go to System>Users;
  2. Click on + to add a new user ;
  3. Insert name and set access rights in Group: full;
  4. Type in your secure password;
  5. Click OK and enable user;
  6. Disable default user: admin.

How do I make sure my router is secure? ›

Keep your home Wi-Fi safe in 7 simple steps
  1. Change the default name of your home Wi-Fi. ...
  2. Make your wireless network password unique and strong. ...
  3. Enable network encryption. ...
  4. Turn off network name broadcasting. ...
  5. Keep your router's software up to date. ...
  6. Make sure you have a good firewall. ...
  7. Use VPNs to access your network.

How do I block VPN on MikroTik? ›

Go to IP > Firewall > Address Lists. -> Click the "+" button to create a new address list. -> Give the address list a name, such as "VPN Servers". -> Add the IP addresses of the VPN servers that you want to block to the address list.

Which is better Cisco or MikroTik? ›

If your organization demands the highest performance, scalability, and security levels and has the budget to support it, Cisco is likely the best fit. On the other hand, with its affordability, flexibility, and user-friendly interface, MikroTik is an excellent option for small to medium-sized businesses and ISPs.

What is the advantage of MikroTik router? ›

The article lists 11 reasons why MikroTik is a great networking solution for businesses of all sizes. These include affordability, flexibility, advanced features, scalability, security, centralized management, protocol support, regular updates, a strong community, and good performance.

Top Articles
Guideline 2024: How to Fetch POST JSON Data
Export-PfxCertificate (pki)
DPhil Research - List of thesis titles
Here are all the MTV VMA winners, even the awards they announced during the ads
Kostenlose Games: Die besten Free to play Spiele 2024 - Update mit einem legendären Shooter
Edgar And Herschel Trivia Questions
13 The Musical Common Sense Media
Find your energy supplier
104 Presidential Ct Lafayette La 70503
Guardians Of The Galaxy Vol 3 Full Movie 123Movies
Nonuclub
Readyset Ochsner.org
Driving Directions To Atlanta
Darksteel Plate Deepwoken
Midlife Crisis F95Zone
Vanessa West Tripod Jeffrey Dahmer
1773X To
Daylight Matt And Kim Lyrics
Trivago Sf
Transactions (zipForm Edition) | Lone Wolf | Real Estate Forms Software
Ahn Waterworks Urgent Care
O'Reilly Auto Parts - Mathis, TX - Nextdoor
Air Traffic Control Coolmathgames
Craigslist Org Appleton Wi
Hannaford To-Go: Grocery Curbside Pickup
Southwest Flight 238
Avatar: The Way Of Water Showtimes Near Maya Pittsburg Cinemas
Spiritual Meaning Of Snake Tattoo: Healing And Rebirth!
Beaufort 72 Hour
Tinyzonehd
Anesthesia Simstat Answers
031515 828
R/Mp5
Slv Fed Routing Number
Panchitos Harlingen Tx
Movies123.Pick
Ny Post Front Page Cover Today
Bimar Produkte Test & Vergleich 09/2024 » GUT bis SEHR GUT
Aliciabibs
Final Fantasy 7 Remake Nexus
Let's co-sleep on it: How I became the mom I swore I'd never be
Ross Dress For Less Hiring Near Me
Trivago Sf
Shoecarnival Com Careers
Flappy Bird Cool Math Games
Ehc Workspace Login
Tommy Bahama Restaurant Bar & Store The Woodlands Menu
Costner-Maloy Funeral Home Obituaries
O'reilly's On Marbach
Lsreg Att
Bomgas Cams
Texas 4A Baseball
Latest Posts
Article information

Author: Nathanael Baumbach

Last Updated:

Views: 5996

Rating: 4.4 / 5 (55 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Nathanael Baumbach

Birthday: 1998-12-02

Address: Apt. 829 751 Glover View, West Orlando, IN 22436

Phone: +901025288581

Job: Internal IT Coordinator

Hobby: Gunsmithing, Motor sports, Flying, Skiing, Hooping, Lego building, Ice skating

Introduction: My name is Nathanael Baumbach, I am a fantastic, nice, victorious, brave, healthy, cute, glorious person who loves writing and wants to share my knowledge and understanding with you.