CVE-2020-5721

MikroTik WinBox 3.22 and below stores the user's cleartext password in the settings.cfg.viw configuration file when the Keep Password field is set and no Master Password is set. Keep Password is set by default and, by default Master Password is not set. An attacker with access to the configuration file can extract a username and password to gain access to the router.
References
Link Resource
https://www.tenable.com/security/research/tra-2020-23 Exploit Third Party Advisory
https://www.tenable.com/security/research/tra-2020-23 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:mikrotik:winbox:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:34

Type Values Removed Values Added
References () https://www.tenable.com/security/research/tra-2020-23 - Exploit, Third Party Advisory () https://www.tenable.com/security/research/tra-2020-23 - Exploit, Third Party Advisory

Information

Published : 2020-04-15 21:15

Updated : 2024-11-21 05:34


NVD link : CVE-2020-5721

Mitre link : CVE-2020-5721

CVE.ORG link : CVE-2020-5721


JSON object : View

Products Affected

mikrotik

  • winbox
CWE
CWE-260

Password in Configuration File

CWE-522

Insufficiently Protected Credentials