Lucene search

K
cve[email protected]CVE-2023-30799
HistoryJul 19, 2023 - 3:15 p.m.

CVE-2023-30799

2023-07-1915:15:10
CWE-269
web.nvd.nist.gov
140
mikrotik
routeros
cve-2023-30799
vulnerability
privilege escalation
winbox
http
remote attacker
authenticated attacker
arbitrary code

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.8%

MikroTik RouterOS stable before 6.49.7 and long-term through 6.48.6 are vulnerable to a privilege escalation issue. A remote and authenticated attacker can escalate privileges from admin to super-admin on the Winbox or HTTP interface. The attacker can abuse this vulnerability to execute arbitrary code on the system.

Affected configurations

NVD
Node
mikrotikrouterosRange6.48.7ltr
OR
mikrotikrouterosRange6.346.49.7-

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "platforms": [
      "x86",
      "ARM",
      "64 bit",
      "mips",
      "ppc"
    ],
    "product": "RouterOS",
    "vendor": "MikroTik",
    "versions": [
      {
        "lessThan": "6.49.7",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      },
      {
        "lessThanOrEqual": "6.48.6",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.8%

Related for CVE-2023-30799