Facebook Twitter Instagram
    Goobuntu
    • Home
    • Linux
    • Windows
    • Mobile
    • News
    Goobuntu
    Home»News»Critical MikroTik RouterOS Flaw Exposes 900,000 Systems

    Critical MikroTik RouterOS Flaw Exposes 900,000 Systems

    0
    By Goobuntu on August 5, 2023 News
    Share
    Facebook Twitter LinkedIn Pinterest Email

    MikroTik RouterOS were vulnerable to a privilege escalation vulnerability which was first disclosed in June 2022 at REcon. The vulnerability existed on the x86 Virtual Machines of RouterOS, where a root shell can be obtained.

    However, the new CVE for this vulnerability was assigned only in the middle of July 2023 when researchers at Vulncheck published new exploits for this vulnerability that can exploit a wider range of Hardware.

    MikroTik released patches for this vulnerability on their stable release version 6.49.7.

    Further investigations revealed that 6.49.7 was the most installed version of the RouterOS, followed by the 6.48.6 version.

    Most installed RouterOS versions (Source: Vulncheck)

    CVE-2023-30799: Privilege Escalation from Admin to Super Admin

    This vulnerability exists due to improper privilege management on the RouterOS versions 6.49.7 through 6.48.6, allowing threat actors to escalate their privileges from admin to super-admin on the Winbox or HTTP interface.

    This can lead to arbitrary code execution on the system by the threat actor. The CVSS score for this vulnerability was given as 9.1 (Critical). Reports indicated that more than 900K routers were vulnerable to CVE-2023-30799.

    Authentication Required But Still Dangerous

    Though this vulnerability requires authentication, it is easier to obtain the credentials as most installations do not change the default “admin” username. Things got even worse when RouterOS prompted their users to set a blank password in October 2021.

    In addition to this, the RouterOS was also vulnerable to brute force attacks on their API port. Nearly 400K routers were exposing their API ports to the internet, which is less when compared to the Winbox or HTTP interface exposure.

    Vulncheck has released a complete report on this vulnerability which mentions the origin, exploitation, and other information.

    For optimal security, it is recommended that users promptly update to the latest version (6.49.8 or 7.x) and apply the necessary patch to address the vulnerability.

    Stay up-to-date with the latest Cyber Security News; follow us on GoogleNews, Linkedin, Twitter, and Facebook.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Forever 21 Systems Hacked: 500,000+ Users Affected

    September 1, 2023

    Hackers Exploit Openfire Vulnerability To Deploy Kinsing Malware

    September 1, 2023

    BadBazaar Malware Attacking Users Via Weaponized Apps

    September 1, 2023

    Leave A Reply Cancel Reply

    Popular Posts
    Forever 21 Systems Hacked: 500,000+ Users Affected
    By GoobuntuSeptember 1, 20230
    How to Fix the Action Center Not Opening in Windows
    By GoobuntuSeptember 1, 20230
    Hackers Exploit Openfire Vulnerability To Deploy Kinsing Malware
    By GoobuntuSeptember 1, 20230
    BadBazaar Malware Attacking Users Via Weaponized Apps
    By GoobuntuSeptember 1, 20230
    © 2023 Goobuntu. All Rights Reserved Goobuntu.
    • Contact Us
    • Privacy Policy
    • DMCA
    • Sitemap

    Type above and press Enter to search. Press Esc to cancel.