Is your MikroTik vulnerable...?

Поделиться
HTML-код
  • Опубликовано: 24 июл 2024
  • Mikrotik routers are one of the most popular router brands on the market, and with good reason. They're rugged and reliable, making them a great choice for a Variety of networking applications. However, as with all devices, Mikrotik routers are susceptible to security vulnerabilities. In this video, I'm going to show you how to protect your router against the latest vulnerability, CVE30799. By following these steps, you'll be able to keep your network safe from potential exploitation.
    👊Thanks for taking time to watch my video. If you could, pressing LIKE and SUBSCRIBING helps more people discover my videos. Feel free to leave a comment for any other topics you would like to see me cover or what your general opinion is of the video.
    🕘Timestamps🕘
    📕00:00 - Introduction
    📕01:02 - Discussing CVE-2023-30799
    📕07:26 - Protecting against CVE-2023-30799
    Support the Channel:
    ⭐Become a Patreon: / thenetworkberg
    ⭐Become a RUclips Member: / @thenetworkberg
    Social Media:
    🌏 / thenetworkberg
    🌏 / bergnetwork
    🌏 / the-network-berg-39451...
    MTCRE Playlist:
    • Free MTCRE RoSv6
    MTCNA Playlist:
    • Free MTCNA RoSv6
    Credits:
    Thumbnail: Created on Canva
    Intro: Created on Canva
    Music by Alumo
    Songs used:
    Dioitic
    Outland 85
    Thanks again for watching

Комментарии • 45

  • @Mensan1960
    @Mensan1960 11 месяцев назад +10

    Just so people don’t get too worried. I’ve had hundreds of MT routers in the wild for almost 20 years and never had an issue. So it IS possible to secure a router.

    • @Lann91
      @Lann91 11 месяцев назад +3

      It's the kind of "vulnerability" that is not really an issue. Like, when there is a Windows/Microsoft shaming post on a new "ultimate crazy windows vulnerability hack", that requires an administrator and physical access to the server to begin with. At that point, are you really need to be a hacker to do damage? Pure clickbait.

    • @TheNetworkBerg
      @TheNetworkBerg  11 месяцев назад +4

      I disagree, if there are people that still use admin/blank as the default login credentials with old firmware then this "Vulnerability" isn't a null issue, the points in the video is aimed at helping people implement some pretty basic yet recommended configurations on their routers to prevent bad actors not only to abuse this CVE but many others.

    • @TheNetworkBerg
      @TheNetworkBerg  11 месяцев назад +3

      @user-zm7qz5fq2d pretty much, which is why there is this video and similar ones like it to tell people to stop using default creds and to help them follow some basic but useful configs to help secure their network so that when security researchers check the scope of a vulnerability that it shouldn't be a staggering number like "nearly a million vulnerable devices"

    • @Darkk6969
      @Darkk6969 11 месяцев назад

      It really should be standard practice to create another admin account with unique weird username and disable (don't delete) the original account. I do this on all devices and Linux servers. The reason I disable the original admin account is sometimes patches / updates may freak out if it can't find it or it may automatically re-create it. Better to disable it.

    • @zadekeys2194
      @zadekeys2194 5 месяцев назад

      Never had an issue you knew about? :) would you mind sharing some of the security config that you use please ?
      I've had a national ISP categorically tell me the Mikrotik they configured is secure, yet in the logs there was evidence that a 3rd party was logging into the router and the ISP didn't know who the 3rd party was. Yes it's a sample of.1, but my rule of thumb is "don't assume it's secure, ever".

  • @Red1Wollip
    @Red1Wollip 11 месяцев назад

    WOW! A great video that helped me imensly. Thank You!

  • @TheNetworkBerg
    @TheNetworkBerg  11 месяцев назад +4

    Pinned comment with some reference material and additional tips:
    Protect your MikroTik from Hackers:
    ruclips.net/video/d39IvN70Eb4/видео.html
    MikroTik Firewall Rules:
    ruclips.net/video/NXvHdZbAuTI/видео.html
    MikroTik's guide to stop Brute Force attacks:
    ruclips.net/video/UXGVQmFUfL4/видео.html
    MikroTik Securing your Router Docs:
    help.mikrotik.com/docs/display/ROS/Securing+your+router
    Vulncheck Article:
    vulncheck.com/blog/mikrotik-foisted-revisited

  • @lukasbruderlin2723
    @lukasbruderlin2723 4 месяца назад

    Just one small remark on vulnerabilities and patches. Yes, I agree the typical CVEs usually are addressed in the patches and most of the time you could forget about it with applied patch. Nevertheless, there are security patches, which are more like a small feature upgrade and to properly address a vulnerability sometimes additional tasks have to be applied. Of course, usually such things are communicated by the vendor, but as most of us don't have too much time to waste on security, this could sometimes get easily forgotten.

  • @mikkio5371
    @mikkio5371 11 месяцев назад

    Nice presentation. Thanks

  • @jblow530
    @jblow530 11 месяцев назад

    Great advice!

  • @Africaontherise00
    @Africaontherise00 11 месяцев назад +2

    Great vidéo as usual

  • @samslab8977
    @samslab8977 11 месяцев назад

    Thank you

  • @Anavllama
    @Anavllama 11 месяцев назад

    Good video in terms of basic good practices, change default winbox port and limit subnet access, only allow access to router on input chain from trusted users, and finally tools --> mac-server, winbox-mac server, and ensure all three different control elements are in sync!.

  • @garethgrant6390
    @garethgrant6390 11 месяцев назад +2

    I’ve been waiting for you to upload a new Video!! Glad to see you’re back in action🥳

  • @Anavllama
    @Anavllama 11 месяцев назад +4

    Most vendors have many CVEs, not unique to MT. Most hacks can only occur if your firewall is not setup properly using basic security practices.

    • @TheNetworkBerg
      @TheNetworkBerg  11 месяцев назад +2

      Definitely, as basic administration and patch management goes a long way in keeping your network secure.
      I looked at FortiNet's CVE list and that was something I was actually surprised at, a massive list for a vendor whose business model is mostly security.

    • @Darkk6969
      @Darkk6969 11 месяцев назад

      @@TheNetworkBerg Yep. I use pfsense for firewall and MikroTik switches for home lab. We use Fortinet firewalls at work and branches which I am admin of. I've also deployed few pfsense appliances at the branches without issues. I am too very annoyed and surprised to see so many CVEs lately on the Fortigates that I am temping to stop buying them and get the pfsense appliances instead.
      Seems lately I have to run the firmware updates several times in short period of time on so many of our Fortigates. It's crazy. I even shut down the ssl-vpn back in Dec as Fortinet's infinite wisdom to expose the ssl-vpn web to the internet for hackers to pick at. Crazy.

  • @Dara.config
    @Dara.config 10 месяцев назад

    Noted sir, Thanks your video is good secure firewall more

  • @samslab8977
    @samslab8977 11 месяцев назад +1

    Thanks

  • @Mi_Fa_Volare
    @Mi_Fa_Volare 11 месяцев назад

    Hi. I rerouted access to a subnet to another router (due to PoE and DAC). Local subnet has one node to hop (gateway) , remote subnet has 2 nodes to hop (gateway). When the firewall rule [chain forward drop invalid] is on local router, responds come only selectively. The router seems to favor only my laptop to access the other subnet (validating its connection states?). Wired nor cellphone can access the other subnet. When I turn off that firewall rule, all clients can access the other subnet like intended. Question is how important is the rule? How much of a security concern is not dropping [forward] [ivalid]? How can I compensate for disabling this rule?

  • @zadekeys2194
    @zadekeys2194 5 месяцев назад

    I often find mikrotiks in the wild running pre RoS 7, with FTP server enabled etc etc...grab nmap and do some.cve scans ;)

  • @kadeem070
    @kadeem070 11 месяцев назад

    Appreciate your videos man. How do you suggest I go about getting out of my NOC role and moving up. I have my ccna, but no promotion opportunities at work. I just want to get my hands on some configurations, I feel myself losing my skills. Is a net engineer too much of a jump? Would a CCNP help? Sorry for the question overload lol

    • @TheNetworkBerg
      @TheNetworkBerg  11 месяцев назад +1

      I think these are good questions, I think the first thing that you can do is have an honest conversation with your current employer and making them aware that you no longer feel challenged in your current role and that you are looking at moving into something else, such as configurations. This will let them know that you will either need a different role that will challenge and grow you which they can help with or that you will potentially move on to new opportunities with another company.
      I think many people are afraid to be direct with their employers because it feels like you are potentially impacting your job security, but in reality employers value this honesty and is many times the reason why someone "moves up"
      As for getting a CCNP, it can definitely help getting an interview with some companies, but from personal experience I think most companies are looking for people with experience already and having the cert itself won't be the biggest reason why you get into an engineering role. You could also check different departments the ISP I first worked for had various divisions and there was an installations team that would primarily drive to a site and install equipment, but they were a part of the config process with core engineers giving them valuable insight and experience until they could move into those roles themselves as they got that hands-on experience.

  • @davidpereira5149
    @davidpereira5149 10 месяцев назад

    Hey Berg
    I just bought an hAP ax Lite and i cant put my wireless working so can you explain how to configure the wifi Wave 2, step by step
    Nice work btw

  • @kresimirpecar4925
    @kresimirpecar4925 11 месяцев назад +2

    So, i can see you are testing new bth option ? Are you planning to do some video about it ?

  • @lukasbruderlin2723
    @lukasbruderlin2723 4 месяца назад

    One question, that you probably get quite frequently, but I haven't seen answered so far: Can you use names for IP addresses, ranges and also for ports, instead of always remembering the specific numbers? Thanks.

  • @watangi
    @watangi 10 месяцев назад

    Duplicate mac address "phones" for mikrotik active What is the solution, please?

  • @user-wu4cw5ed5w
    @user-wu4cw5ed5w 9 месяцев назад

    I usually tend to bind my own routers to be only winbox/ssh accessible from within zerotier network, with the restricted NAT as failover

    • @TheNetworkBerg
      @TheNetworkBerg  9 месяцев назад

      Yeah that sounds like a pretty solid way to manage your devices.

    • @user-wu4cw5ed5w
      @user-wu4cw5ed5w 9 месяцев назад

      @@TheNetworkBerg those newer hAPs rock a lot when you know what to do with them

  • @mmrk_
    @mmrk_ 10 месяцев назад

    +1

  • @sopota6469
    @sopota6469 11 месяцев назад +4

    If you already have a malicious user with admin access this CVE is the least of your problems right now. The thumbnail is a bit sensationalist.
    I was expecting something like a RCE.

    • @TheNetworkBerg
      @TheNetworkBerg  11 месяцев назад +3

      I do talk a bit regarding the subject, suggest watching the video. If you want to see an RCE you are welcome to check out Vulncheck's channel. They have a video of it there showcasing how the exploit works, my video is aimed more at stopping exploits like this from occurring by just some basic but best practice rules when bringing a router online.
      The big problem is that there are just many routers in the wild that still use the default admin/blank credentials running old firmware making them extremely easy to exploit even without things like Brute Force tools. And yes, the thumbnail is supposed to be sensationalist, I want to get people's attention if it can make at least a few people aware of the risks and get them to just implement a few configuration changes and apply patch management to their system then I am very happy if a thumbnail like this got their attention.

    • @aliancemd
      @aliancemd 11 месяцев назад +1

      The problem is that A Lot of Mikrotik devices are running with “admin” without any password in the wild, because of this weird design choice they made early on.
      People are buying these because they are cheap, connecting to the internet and using them like that

  • @markarca6360
    @markarca6360 11 месяцев назад

    Pro tips:
    Disable services you don't use or need.
    Change default ports (for example, SSH, or HTTPS)

    • @WanderTrekker
      @WanderTrekker 11 месяцев назад +1

      Changing ports, does nothing for an targeted attack.

    • @samtihnenko290
      @samtihnenko290 10 месяцев назад

      @@WanderTrekker PSD and FTB does something though

  • @mikkio5371
    @mikkio5371 10 месяцев назад

    It being a while. Hope u are fine

    • @TheNetworkBerg
      @TheNetworkBerg  10 месяцев назад

      I am very much fine ^^, busy moving to a new country and it is taking all my focus so RUclips has taken a slowdown for a bit. Thank you for your concern :)

    • @mikkio5371
      @mikkio5371 10 месяцев назад

      ​@@TheNetworkBerghappy to hear from you ,you are fine .

  • @urvhalt
    @urvhalt 11 месяцев назад

    Manufactured a few miles from russia..

    • @TheNetworkBerg
      @TheNetworkBerg  11 месяцев назад +1

      The US is also a few miles away from Russia :P