CVE-2018-14847

critical

Description

MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.

From the Tenable Blog

MikroTik RouterOS Vulnerabilities: There’s More to CVE-2018-14847
MikroTik RouterOS Vulnerabilities: There’s More to CVE-2018-14847

Published: 2018-10-10

In the course of preparing his Derbycon 8.0 presentation on RouterOS vulnerabilities, Tenable Researcher Jacob Baines discovered more to CVE-2018-14847 than originally known. Here’s how it could allow an unauthenticated remote attacker to gain access to the underlying operating system of MikroTik routers.

References

https://www.tenable.com/blog/analyzing-the-vulnerabilities-associated-with-the-top-malware-strains-of-2021

https://www.exploit-db.com/exploits/45578/

https://n0p.me/winbox-bug-dissection/

https://github.com/tenable/routeros/tree/master/poc/cve_2018_14847

https://github.com/tenable/routeros/tree/master/poc/bytheway

https://github.com/tenable/routeros/blob/master/bug_hunting_in_routeros_derbycon_2018.pdf

https://github.com/BigNerd95/WinboxExploit

https://github.com/BasuCert/WinboxPoC

Details

Source: Mitre, NVD

Published: 2018-08-02

Updated: 2019-03-07

Risk Information

CVSS v2

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Severity: Critical