A buffer overflow was found in the MikroTik RouterOS SMB service when processing NetBIOS session request messages. Remote attackers with access to the service can exploit this vulnerability and gain code execution on the system. The overflow occurs before authentication takes place, so it is possible for an unauthenticated remote attacker to exploit it. All architectures and all devices running RouterOS before versions 6.41.3/6.42rc27 are vulnerable.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 09:15:00 +0900


Wed, 22 Oct 2025 05:30:00 +0900


Wed, 22 Oct 2025 04:30:00 +0900


Sat, 16 Aug 2025 05:30:00 +0900

Type Values Removed Values Added
CPEs cpe:2.3:o:mikrotik:routeros:6.4.2:rc11:*:*:*:*:*:*
cpe:2.3:o:mikrotik:routeros:6.4.2:rc12:*:*:*:*:*:*
cpe:2.3:o:mikrotik:routeros:6.4.2:rc14:*:*:*:*:*:*
cpe:2.3:o:mikrotik:routeros:6.4.2:rc15:*:*:*:*:*:*
cpe:2.3:o:mikrotik:routeros:6.4.2:rc18:*:*:*:*:*:*
cpe:2.3:o:mikrotik:routeros:6.4.2:rc20:*:*:*:*:*:*
cpe:2.3:o:mikrotik:routeros:6.4.2:rc23:*:*:*:*:*:*
cpe:2.3:o:mikrotik:routeros:6.4.2:rc24:*:*:*:*:*:*
cpe:2.3:o:mikrotik:routeros:6.4.2:rc27:*:*:*:*:*:*
cpe:2.3:o:mikrotik:routeros:6.4.2:rc2:*:*:*:*:*:*
cpe:2.3:o:mikrotik:routeros:6.4.2:rc5:*:*:*:*:*:*
cpe:2.3:o:mikrotik:routeros:6.4.2:rc6:*:*:*:*:*:*
cpe:2.3:o:mikrotik:routeros:6.4.2:rc9:*:*:*:*:*:*
cpe:2.3:o:mikrotik:routeros:6.42:rc11:*:*:*:*:*:*
cpe:2.3:o:mikrotik:routeros:6.42:rc12:*:*:*:*:*:*
cpe:2.3:o:mikrotik:routeros:6.42:rc14:*:*:*:*:*:*
cpe:2.3:o:mikrotik:routeros:6.42:rc15:*:*:*:*:*:*
cpe:2.3:o:mikrotik:routeros:6.42:rc18:*:*:*:*:*:*
cpe:2.3:o:mikrotik:routeros:6.42:rc20:*:*:*:*:*:*
cpe:2.3:o:mikrotik:routeros:6.42:rc23:*:*:*:*:*:*
cpe:2.3:o:mikrotik:routeros:6.42:rc24:*:*:*:*:*:*
cpe:2.3:o:mikrotik:routeros:6.42:rc2:*:*:*:*:*:*
cpe:2.3:o:mikrotik:routeros:6.42:rc5:*:*:*:*:*:*
cpe:2.3:o:mikrotik:routeros:6.42:rc6:*:*:*:*:*:*
cpe:2.3:o:mikrotik:routeros:6.42:rc9:*:*:*:*:*:*

Sat, 08 Feb 2025 02:15:00 +0900

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2022-09-08'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 28 Jan 2025 03:45:00 +0900

Type Values Removed Values Added
Metrics cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-10-21T23:45:55.366Z

Reserved: 2018-02-23T00:00:00.000Z

Link: CVE-2018-7445

cve-icon Vulnrichment

Updated: 2024-08-05T06:24:11.978Z

cve-icon NVD

Status : Analyzed

Published: 2018-03-19T21:29:01.083

Modified: 2025-11-07T19:04:17.633

Link: CVE-2018-7445

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses