Re: [Mikrotik Users] Exploit in ROS 6.41.3/6.42rc27

2018-08-06 Thread Roy via Mikrotik-users
One of the benefits of using a configuration management  tool like RANCID is that it sends out an email saying the configuration was changed and what the modifications were.  We had one older router that was compromised and I saw the changes in the RANCID

Re: [Mikrotik Users] Exploit in ROS 6.41.3/6.42rc27

2018-08-06 Thread Scott Reed via Mikrotik-users
Right. I wanted to make sure people know that there are lots of things that may or may not be impacted if a device is infected.  You either have to totally delete the configuration and restore from backup or you need to go through every menu item and make sure they have not been changed. On

Re: [Mikrotik Users] Exploit in ROS 6.41.3/6.42rc27

2018-08-06 Thread Tim via Mikrotik-users
This has been detected in devices with earlier versions of ROS. From: mikrotik-users-boun...@wispa.org On Behalf Of Scott Reed via Mikrotik-users Sent: Monday, August 6, 2018 5:58 AM To: mikrotik-users@wispa.org Subject: Re: [Mikrotik Users] Exploit in ROS 6.41.3/6.42rc27 It will also chang

Re: [Mikrotik Users] Exploit in ROS 6.41.3/6.42rc27

2018-08-06 Thread Scott Reed via Mikrotik-users
It will also change device identity, change admin password, add Admin, add 5 firewall filter rules to redirect forward traffic, change DNS server, enable DDNS, add IP Web Proxy rules and more, but that is all I remember off the top of my head. On 8/5/2018 20:57, Bob Pensworth via Mikrotik-use