![]() When a security expert publishes his exploit research - anyone can apply such an exploit someone will build a container image that will do the exploit AND provide a Linux root shell by using a root shell someone may leave a permanent backdoor/vulnerability in your RouterOS system even after the docker image is removed and the container feature disabled if a vulnerability is injected into the primary or secondary routerboot (or vendor pre-loader), then even netinstall may not be able to fix it RequirementsĬontainer package is compatible with arm arm64 and x86 architectures. an expert with knowledge how to build exploits will be able to jailbreak/elevate to root. ![]() running a 3rd party container image on your router could open a security hole/attack vector/attack surface.if you run container, there is no security guarantee of any kind.your router is as secure as anything you run in container.if the router is compromised, containers can be used to easily install malicious software in your router and over network.once the container feature is enabled, containers can be added/configured/started/stopped/removed remotely!.you need physical access to the router to enable support for the container feature, it is disabled by default.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |