First published: Wed Jul 19 2023(Updated: )
MikroTik RouterOS stable before 6.49.7 and long-term through 6.48.6 are vulnerable to a privilege escalation issue. A remote and authenticated attacker can escalate privileges from admin to super-admin on the Winbox or HTTP interface. The attacker can abuse this vulnerability to execute arbitrary code on the system.
Credit: disclosure@vulncheck.com disclosure@vulncheck.com
Affected Software | Affected Version | How to fix |
---|---|---|
MikroTik RouterOS | <=6.48.7 | |
MikroTik RouterOS | >=6.34<6.49.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-30799 is critical with a CVSS score of 7.2.
An attacker can exploit CVE-2023-30799 by escalating privileges from admin to super-admin on the Winbox or HTTP interface.
The affected software of CVE-2023-30799 is MikroTik RouterOS stable versions before 6.49.7 and long-term versions through 6.48.6.
To fix CVE-2023-30799, it is recommended to update MikroTik RouterOS to version 6.49.7 or later.
Yes, you can refer to the following links for more information about CVE-2023-30799: - [MikroTik Foisted Advisory](https://vulncheck.com/advisories/mikrotik-foisted) - [FOISted GitHub Repository](https://github.com/MarginResearch/FOISted)