CVE-2023-30800
MikroTik RouterOS Web Interface Heap Corruption
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The web server used by MikroTik RouterOS version 6 is affected by a heap memory corruption issue. A remote and unauthenticated attacker can corrupt the server's heap memory by sending a crafted HTTP request. As a result, the web interface crashes and is immediately restarted. The issue was fixed in RouterOS 6.49.10 stable. RouterOS version 7 is not affected.
El servidor web utilizado por MikroTik RouterOS versión 6 se ve afectado por un problema de corrupción de memoria. Un atacante remoto y no autenticado puede dañar la memoria de almacenamiento dinámico del servidor mediante el envío de una solicitud HTTP manipulada. Como resultado, la interfaz web se bloquea y se reinicia inmediatamente. El problema se solucionó en RouterOS 6.49.10 stable. RouterOS versión 7 no se ve afectado.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2023-04-18 CVE Reserved
- 2023-09-07 CVE Published
- 2024-09-26 CVE Updated
- 2024-09-26 First Exploit
- 2024-10-09 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-787: Out-of-bounds Write
CAPEC
- CAPEC-123: Buffer Manipulation
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://vulncheck.com/advisories/mikrotik-jsproxy-dos | 2024-09-26 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mikrotik Search vendor "Mikrotik" | Routeros Search vendor "Mikrotik" for product "Routeros" | >= 6.0 < 6.49.10 Search vendor "Mikrotik" for product "Routeros" and version " >= 6.0 < 6.49.10" | - |
Affected
|