In case you haven't noticed, MikroTik RouterOS Stable before version 6.49.7 and in the long-term version up to 6.48.6 contains a vulnerability CVE-2023-30799 that allows an attacker to escalate privileges, but the attacker must be authenticated. However, he can then remotely escalate privileges from admin to super-admin on the Winbox or HTTP interface. This then allows him to execute arbitrary code on the system. Details can be found on GitHub; MikroTik posted this warning. This issue is fixed in all RouterOS versions available on the MikroTik download page (v7.7 and v6.49.7 and newer). According to the colleagues at Bleeping Computer, 900,000 devices are potentially vulnerable to this vulnerability.
Blogs
Links
Social networks
Awards
Sponsors
(Paypal-Donations)Recent Comments
- OldNavyGuy on Windows 10/11: Update KB5001716 is (secretly) installed
- Juppy on Windows: Mail app will no longer work from December 31, 2024
- EP on Will Windows 10 end on October 14, 2025? A bit …
- Anonymous on Interpol shuts down 22,000 IP addresses
- EP on BIOS-Update 01.17.00 bricks HP Probooks 445 G7 and 455 G7
Recent Comments
- OldNavyGuy on Windows 10/11: Update KB5001716 is (secretly) installed
- Juppy on Windows: Mail app will no longer work from December 31, 2024
- EP on Will Windows 10 end on October 14, 2025? A bit …
- Anonymous on Interpol shuts down 22,000 IP addresses
- EP on BIOS-Update 01.17.00 bricks HP Probooks 445 G7 and 455 G7