First published: Thu Feb 06 2020(Updated: )
MikroTik WinBox before 3.21 is vulnerable to a path traversal vulnerability that allows creation of arbitrary files wherevere WinBox has write permissions. WinBox is vulnerable to this attack if it connects to a malicious endpoint or if an attacker mounts a man in the middle attack.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
MikroTik Winbox | <3.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5720 is a vulnerability in MikroTik WinBox before version 3.21 that allows for a path traversal attack, enabling the creation of arbitrary files.
CVE-2020-5720 has a severity keyword of 'medium' and a severity value of 5.9.
CVE-2020-5720 affects MikroTik WinBox before version 3.21 by allowing the creation of arbitrary files wherever WinBox has write permissions.
CVE-2020-5720 can be exploited by connecting MikroTik WinBox to a malicious endpoint or through a man-in-the-middle attack.
To fix CVE-2020-5720, users should update MikroTik WinBox to version 3.21 or later.