|
|||
Rule General Information |
---|
Release Date: | 2018-10-09 | |
Rule Name: | Mikrotik Winbox Arbitrary File Read Vulnerability (CVE-2018-14847) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface. | |
Impact: | The attack can be launched remotely. Technical details are unknown but a public exploit is available. | |
Affected OS: | Network Device, Solaris, FreeBSD, Windows, Mac OS, iOS, Other Unix, Linux, Others, Android | |
Reference: | ExploitDB:45578 https://github.com/BasuCert/WinboxPoC https://github.com/BigNerd95/WinboxExploit https://github.com/tenable/routeros/blob/master/bug_hunting_in_routeros_derbycon_2018.pdf |
|
Solutions |
---|
Refer to the announcement or patch by the vendor: https://mikrotik.com/ |