First published: Tue Feb 11 2025(Updated: )
An issue was discovered in the Winbox service of MikroTik RouterOS long-term release v6.43.13 through v6.49.13 and stable v6.43 through v7.17.2. A patch is available in the stable release v6.49.18. A discrepancy in response size between connection attempts made with a valid username and those with an invalid username allows attackers to enumerate for valid accounts.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MikroTik RouterOS | >=6.43.13<=6.49.13 | |
MikroTik RouterOS | >=6.43<=7.17.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-54772 is considered a medium severity vulnerability due to the risk of account enumeration.
To fix CVE-2024-54772, users should upgrade MikroTik RouterOS to a version higher than 7.16.1.
CVE-2024-54772 affects MikroTik RouterOS versions from 6.43 to 7.16.1.
The impact of CVE-2024-54772 allows attackers to enumerate valid usernames, potentially leading to unauthorized access.
Currently, there is no documented workaround for CVE-2024-54772 other than applying the necessary software updates.