CVE-2019-15055

MikroTik RouterOS through 6.44.5 and 6.45.x through 6.45.3 improperly handles the disk name, which allows authenticated users to delete arbitrary files. Attackers can exploit this vulnerability to reset credential storage, which allows them access to the management interface as an administrator without authentication.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*
cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:27

Type Values Removed Values Added
References () https://fortiguard.com/zeroday/FG-VD-19-108 - Third Party Advisory () https://fortiguard.com/zeroday/FG-VD-19-108 - Third Party Advisory
References () https://forum.mikrotik.com/viewtopic.php?t=151603 - () https://forum.mikrotik.com/viewtopic.php?t=151603 -
References () https://github.com/tenable/routeros/tree/master/poc/cve_2019_15055 - Exploit, Third Party Advisory () https://github.com/tenable/routeros/tree/master/poc/cve_2019_15055 - Exploit, Third Party Advisory
References () https://medium.com/tenable-techblog/rooting-routeros-with-a-usb-drive-16d7b8665f90 - Press/Media Coverage, Third Party Advisory () https://medium.com/tenable-techblog/rooting-routeros-with-a-usb-drive-16d7b8665f90 - Press/Media Coverage, Third Party Advisory
References () https://mikrotik.com/download/changelogs/testing-release-tree - Release Notes, Vendor Advisory () https://mikrotik.com/download/changelogs/testing-release-tree - Release Notes, Vendor Advisory

Information

Published : 2019-08-26 21:15

Updated : 2024-11-21 04:27


NVD link : CVE-2019-15055

Mitre link : CVE-2019-15055

CVE.ORG link : CVE-2019-15055


JSON object : View

Products Affected

mikrotik

  • routeros
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')