// For flags

CVE-2023-30799

MikroTik RouterOS Administrator Privilege Escalation

Severity Score

7.2
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

MikroTik RouterOS stable before 6.49.7 and long-term through 6.48.6 are vulnerable to a privilege escalation issue. A remote and authenticated attacker can escalate privileges from admin to super-admin on the Winbox or HTTP interface. The attacker can abuse this vulnerability to execute arbitrary code on the system.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2023-04-18 CVE Reserved
  • 2023-07-19 CVE Published
  • 2024-07-25 EPSS Updated
  • 2024-10-24 CVE Updated
  • 2024-10-24 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-269: Improper Privilege Management
CAPEC
  • CAPEC-233: Privilege Escalation
References (2)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mikrotik
Search vendor "Mikrotik"
Routeros
Search vendor "Mikrotik" for product "Routeros"
<= 6.48.7
Search vendor "Mikrotik" for product "Routeros" and version " <= 6.48.7"
ltr
Affected
Mikrotik
Search vendor "Mikrotik"
Routeros
Search vendor "Mikrotik" for product "Routeros"
>= 6.34 < 6.49.7
Search vendor "Mikrotik" for product "Routeros" and version " >= 6.34 < 6.49.7"
-
Affected