First published: Tue Jan 14 2020(Updated: )
MikroTik Winbox 3.20 and below is vulnerable to man in the middle attacks. A man in the middle can downgrade the client's authentication protocol and recover the user's username and MD5 hashed password.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
MikroTik RouterOS | <6.43 | |
MikroTik Winbox | <3.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-3981.
The severity of CVE-2019-3981 is medium with a severity value of 3.7.
MikroTik RouterOS versions up to 6.43 and MikroTik Winbox versions up to 3.20 are affected by CVE-2019-3981.
CVE-2019-3981 allows a man in the middle to downgrade the client's authentication protocol, enabling them to recover the user's username and MD5 hashed password.
Yes, MikroTik has released security patches to address the vulnerability. It is recommended to update to the latest version of MikroTik RouterOS and Winbox to mitigate CVE-2019-3981.