First published: Wed Apr 15 2020(Updated: )
MikroTik WinBox 3.22 and below stores the user's cleartext password in the settings.cfg.viw configuration file when the Keep Password field is set and no Master Password is set. Keep Password is set by default and, by default Master Password is not set. An attacker with access to the configuration file can extract a username and password to gain access to the router.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
MikroTik Winbox | <=3.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-5721.
The severity of CVE-2020-5721 is medium with a score of 5.5.
The affected software is MikroTik WinBox version 3.22 and below.
CVE-2020-5721 stores the user's cleartext password in the settings.cfg.viw configuration file when the Keep Password field is set and no Master Password is set.
Yes, updating MikroTik WinBox to a version above 3.22 will fix CVE-2020-5721 vulnerability.