Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.TENABLE_OT_MIKROTIK_CVE-2019-3943.NASL
HistoryFeb 27, 2024 - 12:00 a.m.

MikroTik RouterOS Path Traversal (CVE-2019-3943)

2024-02-2700:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
10
mikrotik
routeros
path traversal
cve-2019-3943
authenticated
remote
directory traversal
http
winbox
tenable.ot

8.2 High

AI Score

Confidence

High

MikroTik RouterOS versions Stable 6.43.12 and below, Long-term 6.42.12 and below, and Testing 6.44beta75 and below are vulnerable to an authenticated, remote directory traversal via the HTTP or Winbox interfaces. An authenticated, remote attack can use this vulnerability to read and write files outside of the sandbox directory (/rw/disk).

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(502043);
  script_version("1.1");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/02/28");

  script_cve_id("CVE-2019-3943");

  script_name(english:"MikroTik RouterOS Path Traversal (CVE-2019-3943)");

  script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
  script_set_attribute(attribute:"description", value:
"MikroTik RouterOS versions Stable 6.43.12 and below, Long-term 6.42.12
and below, and Testing 6.44beta75 and below are vulnerable to an
authenticated, remote directory traversal via the HTTP or Winbox
interfaces. An authenticated, remote attack can use this vulnerability
to read and write files outside of the sandbox directory (/rw/disk).

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.");
  script_set_attribute(attribute:"see_also", value:"https://www.tenable.com/security/research/tra-2019-16");
  script_set_attribute(attribute:"solution", value:
"Refer to the vendor advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-3943");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_cwe_id(22);

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/04/10");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/04/10");
  script_set_attribute(attribute:"plugin_publication_date", value:"2024/02/27");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.41:rc31");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.41:rc32");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.41:rc34");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.41:rc37");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.41:rc38");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.41:rc44");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.41:rc47");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.41:rc50");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.41:rc52");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.41:rc56");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.41:rc61");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.41:rc66");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc11");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc12");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc14");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc15");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc18");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc20");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc23");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc24");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc27");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc28");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc2");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc30");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc35");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc37");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc39");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc41");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc43");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc46");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc48");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc49");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc52");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc56");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc5");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc6");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc9");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc11");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc12");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc14");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc17");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc19");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc21");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc23");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc27");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc29");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc32");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc34");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc3");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc40");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc42");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc44");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc45");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc4");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc51");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc56");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc5");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc64");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc66");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc6");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc7");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.44:beta14");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.44:beta17");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.44:beta20");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.44:beta28");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.44:beta39");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.44:beta40");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.44:beta50");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.44:beta54");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.44:beta61");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.44:beta6");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.44:beta75");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.44:beta9");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros");
  script_set_attribute(attribute:"generated_plugin", value:"former");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Tenable.ot");

  script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("tenable_ot_api_integration.nasl");
  script_require_keys("Tenable.ot/MikroTik");

  exit(0);
}


include('tenable_ot_cve_funcs.inc');

get_kb_item_or_exit('Tenable.ot/MikroTik');

var asset = tenable_ot::assets::get(vendor:'MikroTik');

var vuln_cpes = {
    "cpe:/o:mikrotik:routeros":
	   {"versionEndIncluding" : "6.43.12", "family" : "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.41:rc31":
		{"versionEndIncluding": "6.41rc31", "versionStartIncluding": "6.41rc31", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.41:rc32":
		{"versionEndIncluding": "6.41rc32", "versionStartIncluding": "6.41rc32", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.41:rc34":
		{"versionEndIncluding": "6.41rc34", "versionStartIncluding": "6.41rc34", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.41:rc37":
		{"versionEndIncluding": "6.41rc37", "versionStartIncluding": "6.41rc37", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.41:rc38":
		{"versionEndIncluding": "6.41rc38", "versionStartIncluding": "6.41rc38", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.41:rc44":
		{"versionEndIncluding": "6.41rc44", "versionStartIncluding": "6.41rc44", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.41:rc47":
		{"versionEndIncluding": "6.41rc47", "versionStartIncluding": "6.41rc47", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.41:rc50":
		{"versionEndIncluding": "6.41rc50", "versionStartIncluding": "6.41rc50", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.41:rc52":
		{"versionEndIncluding": "6.41rc52", "versionStartIncluding": "6.41rc52", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.41:rc56":
		{"versionEndIncluding": "6.41rc56", "versionStartIncluding": "6.41rc56", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.41:rc61":
		{"versionEndIncluding": "6.41rc61", "versionStartIncluding": "6.41rc61", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.41:rc66":
		{"versionEndIncluding": "6.41rc66", "versionStartIncluding": "6.41rc66", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.42:rc11":
		{"versionEndIncluding": "6.42rc11", "versionStartIncluding": "6.42rc11", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.42:rc12":
		{"versionEndIncluding": "6.42rc12", "versionStartIncluding": "6.42rc12", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.42:rc14":
		{"versionEndIncluding": "6.42rc14", "versionStartIncluding": "6.42rc14", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.42:rc15":
		{"versionEndIncluding": "6.42rc15", "versionStartIncluding": "6.42rc15", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.42:rc18":
		{"versionEndIncluding": "6.42rc18", "versionStartIncluding": "6.42rc18", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.42:rc2":
		{"versionEndIncluding": "6.42rc2", "versionStartIncluding": "6.42rc2", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.42:rc20":
		{"versionEndIncluding": "6.42rc20", "versionStartIncluding": "6.42rc20", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.42:rc23":
		{"versionEndIncluding": "6.42rc23", "versionStartIncluding": "6.42rc23", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.42:rc24":
		{"versionEndIncluding": "6.42rc24", "versionStartIncluding": "6.42rc24", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.42:rc27":
		{"versionEndIncluding": "6.42rc27", "versionStartIncluding": "6.42rc27", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.42:rc28":
		{"versionEndIncluding": "6.42rc28", "versionStartIncluding": "6.42rc28", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.42:rc30":
		{"versionEndIncluding": "6.42rc30", "versionStartIncluding": "6.42rc30", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.42:rc35":
		{"versionEndIncluding": "6.42rc35", "versionStartIncluding": "6.42rc35", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.42:rc37":
		{"versionEndIncluding": "6.42rc37", "versionStartIncluding": "6.42rc37", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.42:rc39":
		{"versionEndIncluding": "6.42rc39", "versionStartIncluding": "6.42rc39", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.42:rc41":
		{"versionEndIncluding": "6.42rc41", "versionStartIncluding": "6.42rc41", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.42:rc43":
		{"versionEndIncluding": "6.42rc43", "versionStartIncluding": "6.42rc43", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.42:rc46":
		{"versionEndIncluding": "6.42rc46", "versionStartIncluding": "6.42rc46", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.42:rc48":
		{"versionEndIncluding": "6.42rc48", "versionStartIncluding": "6.42rc48", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.42:rc49":
		{"versionEndIncluding": "6.42rc49", "versionStartIncluding": "6.42rc49", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.42:rc5":
		{"versionEndIncluding": "6.42rc5", "versionStartIncluding": "6.42rc5", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.42:rc52":
		{"versionEndIncluding": "6.42rc52", "versionStartIncluding": "6.42rc52", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.42:rc56":
		{"versionEndIncluding": "6.42rc56", "versionStartIncluding": "6.42rc56", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.42:rc6":
		{"versionEndIncluding": "6.42rc6", "versionStartIncluding": "6.42rc6", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.42:rc9":
		{"versionEndIncluding": "6.42rc9", "versionStartIncluding": "6.42rc9", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.43:rc11":
		{"versionEndIncluding": "6.43rc11", "versionStartIncluding": "6.43rc11", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.43:rc12":
		{"versionEndIncluding": "6.43rc12", "versionStartIncluding": "6.43rc12", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.43:rc14":
		{"versionEndIncluding": "6.43rc14", "versionStartIncluding": "6.43rc14", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.43:rc17":
		{"versionEndIncluding": "6.43rc17", "versionStartIncluding": "6.43rc17", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.43:rc19":
		{"versionEndIncluding": "6.43rc19", "versionStartIncluding": "6.43rc19", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.43:rc21":
		{"versionEndIncluding": "6.43rc21", "versionStartIncluding": "6.43rc21", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.43:rc23":
		{"versionEndIncluding": "6.43rc23", "versionStartIncluding": "6.43rc23", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.43:rc27":
		{"versionEndIncluding": "6.43rc27", "versionStartIncluding": "6.43rc27", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.43:rc29":
		{"versionEndIncluding": "6.43rc29", "versionStartIncluding": "6.43rc29", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.43:rc3":
		{"versionEndIncluding": "6.43rc3", "versionStartIncluding": "6.43rc3", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.43:rc32":
		{"versionEndIncluding": "6.43rc32", "versionStartIncluding": "6.43rc32", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.43:rc34":
		{"versionEndIncluding": "6.43rc34", "versionStartIncluding": "6.43rc34", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.43:rc4":
		{"versionEndIncluding": "6.43rc4", "versionStartIncluding": "6.43rc4", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.43:rc40":
		{"versionEndIncluding": "6.43rc40", "versionStartIncluding": "6.43rc40", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.43:rc42":
		{"versionEndIncluding": "6.43rc42", "versionStartIncluding": "6.43rc42", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.43:rc44":
		{"versionEndIncluding": "6.43rc44", "versionStartIncluding": "6.43rc44", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.43:rc45":
		{"versionEndIncluding": "6.43rc45", "versionStartIncluding": "6.43rc45", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.43:rc5":
		{"versionEndIncluding": "6.43rc5", "versionStartIncluding": "6.43rc5", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.43:rc51":
		{"versionEndIncluding": "6.43rc51", "versionStartIncluding": "6.43rc51", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.43:rc56":
		{"versionEndIncluding": "6.43rc56", "versionStartIncluding": "6.43rc56", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.43:rc6":
		{"versionEndIncluding": "6.43rc6", "versionStartIncluding": "6.43rc6", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.43:rc64":
		{"versionEndIncluding": "6.43rc64", "versionStartIncluding": "6.43rc64", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.43:rc66":
		{"versionEndIncluding": "6.43rc66", "versionStartIncluding": "6.43rc66", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.43:rc7":
		{"versionEndIncluding": "6.43rc7", "versionStartIncluding": "6.43rc7", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.44:beta14":
		{"versionEndIncluding": "6.44beta14", "versionStartIncluding": "6.44beta14", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.44:beta17":
		{"versionEndIncluding": "6.44beta17", "versionStartIncluding": "6.44beta17", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.44:beta20":
		{"versionEndIncluding": "6.44beta20", "versionStartIncluding": "6.44beta20", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.44:beta28":
		{"versionEndIncluding": "6.44beta28", "versionStartIncluding": "6.44beta28", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.44:beta39":
		{"versionEndIncluding": "6.44beta39", "versionStartIncluding": "6.44beta39", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.44:beta40":
		{"versionEndIncluding": "6.44beta40", "versionStartIncluding": "6.44beta40", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.44:beta50":
		{"versionEndIncluding": "6.44beta50", "versionStartIncluding": "6.44beta50", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.44:beta54":
		{"versionEndIncluding": "6.44beta54", "versionStartIncluding": "6.44beta54", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.44:beta6":
		{"versionEndIncluding": "6.44beta6", "versionStartIncluding": "6.44beta6", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.44:beta61":
		{"versionEndIncluding": "6.44beta61", "versionStartIncluding": "6.44beta61", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.44:beta75":
		{"versionEndIncluding": "6.44beta75", "versionStartIncluding": "6.44beta75", "family": "RouterOS"},
    "cpe:/o:mikrotik:routeros:6.44:beta9":
		{"versionEndIncluding": "6.44beta9", "versionStartIncluding": "6.44beta9", "family": "RouterOS"}
};

tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_HOLE);
VendorProductVersionCPE
mikrotikrouteros6.41cpe:/o:mikrotik:routeros:6.41:rc31
mikrotikrouteros6.41cpe:/o:mikrotik:routeros:6.41:rc32
mikrotikrouteros6.41cpe:/o:mikrotik:routeros:6.41:rc34
mikrotikrouteros6.41cpe:/o:mikrotik:routeros:6.41:rc37
mikrotikrouteros6.41cpe:/o:mikrotik:routeros:6.41:rc38
mikrotikrouteros6.41cpe:/o:mikrotik:routeros:6.41:rc44
mikrotikrouteros6.41cpe:/o:mikrotik:routeros:6.41:rc47
mikrotikrouteros6.41cpe:/o:mikrotik:routeros:6.41:rc50
mikrotikrouteros6.41cpe:/o:mikrotik:routeros:6.41:rc52
mikrotikrouteros6.41cpe:/o:mikrotik:routeros:6.41:rc56
Rows per page:
1-10 of 741

8.2 High

AI Score

Confidence

High

Related for TENABLE_OT_MIKROTIK_CVE-2019-3943.NASL