We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-30799

MikroTik RouterOS Administrator Privilege Escalation



AssignerVulnCheck
Reserved2023-04-18
Published2023-07-19
Updated2024-10-24

Description

MikroTik RouterOS stable before 6.49.7 and long-term through 6.48.6 are vulnerable to a privilege escalation issue. A remote and authenticated attacker can escalate privileges from admin to super-admin on the Winbox or HTTP interface. The attacker can abuse this vulnerability to execute arbitrary code on the system.



CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Product status

Default status
unaffected

Any version before 6.49.7
affected

Any version
affected

References

https://vulncheck.com/advisories/mikrotik-foisted third-party-advisory

https://github.com/MarginResearch/FOISted exploit

cve.org CVE-2023-30799

nvd.nist.gov CVE-2023-30799

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.