MikroTik WinBox 3.22 and below stores the user's cleartext password in the settings.cfg.viw configuration file when the Keep Password field is set and no Master Password is set. Keep Password is set by default and, by default Master Password is not set. An attacker with access to the configuration file can extract a username and password to gain access to the router.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2020-23 | Exploit Third Party Advisory |
https://www.tenable.com/security/research/tra-2020-23 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.tenable.com/security/research/tra-2020-23 - Exploit, Third Party Advisory |
Information
Published : 2020-04-15 21:15
Updated : 2024-11-21 05:34
NVD link : CVE-2020-5721
Mitre link : CVE-2020-5721
CVE.ORG link : CVE-2020-5721
JSON object : View
Products Affected
mikrotik
- winbox