First published: Mon Aug 26 2019(Updated: )
MikroTik RouterOS through 6.44.5 and 6.45.x through 6.45.3 improperly handles the disk name, which allows authenticated users to delete arbitrary files. Attackers can exploit this vulnerability to reset credential storage, which allows them access to the management interface as an administrator without authentication.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MikroTik devices | <=6.44.5 | |
MikroTik devices | >=6.45<=6.45.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15055 has a high severity rating as it allows authenticated users to delete arbitrary files on MikroTik RouterOS devices.
To fix CVE-2019-15055, upgrade MikroTik RouterOS to a version higher than 6.45.3 or apply any available security patches.
CVE-2019-15055 affects MikroTik RouterOS versions up to 6.44.5 and versions between 6.45.0 and 6.45.3.
Attackers can exploit CVE-2019-15055 to delete arbitrary files, which may include resetting credential storage for unauthorized access.
CVE-2019-15055 is a local vulnerability that requires authenticated user access to exploit.