CVE-2019-3943
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
10/04/2019
Last modified:
17/12/2019
Description
MikroTik RouterOS versions Stable 6.43.12 and below, Long-term 6.42.12 and below, and Testing 6.44beta75 and below are vulnerable to an authenticated, remote directory traversal via the HTTP or Winbox interfaces. An authenticated, remote attack can use this vulnerability to read and write files outside of the sandbox directory (/rw/disk).
Impact
Base Score 3.x
8.10
Severity 3.x
HIGH
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:mikrotik:routeros:*:*:*:*:ltr:*:*:* | 6.42.12 (including) | |
| cpe:2.3:o:mikrotik:routeros:*:*:*:*:-:*:*:* | 6.43.12 (including) | |
| cpe:2.3:o:mikrotik:routeros:6.41:rc31:*:*:testing:*:*:* | ||
| cpe:2.3:o:mikrotik:routeros:6.41:rc32:*:*:testing:*:*:* | ||
| cpe:2.3:o:mikrotik:routeros:6.41:rc34:*:*:testing:*:*:* | ||
| cpe:2.3:o:mikrotik:routeros:6.41:rc37:*:*:testing:*:*:* | ||
| cpe:2.3:o:mikrotik:routeros:6.41:rc38:*:*:testing:*:*:* | ||
| cpe:2.3:o:mikrotik:routeros:6.41:rc44:*:*:testing:*:*:* | ||
| cpe:2.3:o:mikrotik:routeros:6.41:rc47:*:*:testing:*:*:* | ||
| cpe:2.3:o:mikrotik:routeros:6.41:rc50:*:*:testing:*:*:* | ||
| cpe:2.3:o:mikrotik:routeros:6.41:rc52:*:*:testing:*:*:* | ||
| cpe:2.3:o:mikrotik:routeros:6.41:rc56:*:*:testing:*:*:* | ||
| cpe:2.3:o:mikrotik:routeros:6.41:rc61:*:*:testing:*:*:* | ||
| cpe:2.3:o:mikrotik:routeros:6.41:rc66:*:*:testing:*:*:* | ||
| cpe:2.3:o:mikrotik:routeros:6.42:rc11:*:*:testing:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



