MikroTik provides hardware and software for Internet connectivity around the world and they also created a RouterOS software.
This vulnerability allows the watchdog timer to reboots the router that causes device overloaded and eventually stop responding, the issue was addressed and fixed.
But another issue caused the memory to be filled because IPv6 route cache size could be bigger than the available RAM.
This flaw also was fixed by introducing automatic cache size calculation based on available memory, MikroTik said.
MikroTik patches flaw CVE-2018-19299, but an unpatched MikroTik router that routes the traffic via IPV6 will be affected.
It allows an attacker to take down the MikroTik router and exhausting the RAM by routes the malicious traffic via IPV6.
This fixes working in the following way,
- ipv6 – fixed soft lockup when forwarding IPv6 packets
- ipv6 – fixed soft lockup when processing large IPv6 Neighbor table
- ipv6 – adjust IPv6 route cache max size based on total RAM memory
So if the routers with RouterOS 6.44.2 do not crash if they have enough memory.
MikroTik advised to Upgrade to any RouterOS version released after April 1st, 2019.