SB2018042420 - Authentication bypass in MikroTik RouterOS



SB2018042420 - Authentication bypass in MikroTik RouterOS

Published: April 24, 2018 Updated: May 13, 2024

Security Bulletin ID SB2018042420
Severity
Critical
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Improper authentication (CVE-ID: CVE-2018-14847)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to improper authentication in the exposed by default Winbox interface on port 8291/TCP. A remote attacker can send specially crafted packets to the affected service, bypass authentication, download local database with user accounts and gain full access to the vulnerable device.

Successful exploitation of the vulnerability may result in system compromise.

Note: this vulnerability has being exploited in the wild in April 2018.

Remediation

Install update from vendor's website.