Vulnerability Details : CVE-2019-15055
Potential exploit
MikroTik RouterOS through 6.44.5 and 6.45.x through 6.45.3 improperly handles the disk name, which allows authenticated users to delete arbitrary files. Attackers can exploit this vulnerability to reset credential storage, which allows them access to the management interface as an administrator without authentication.
Vulnerability category: Directory traversal
Products affected by CVE-2019-15055
- cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*
- cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-15055
0.57%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 66 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-15055
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:P/A:P |
8.0
|
4.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2019-15055
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-15055
-
https://fortiguard.com/zeroday/FG-VD-19-108
Fortinet Discovers MikroTik RouterOS Authenticated Arbitrary File Deletion Vulnerability | FortiGuardThird Party Advisory
-
https://github.com/tenable/routeros/tree/master/poc/cve_2019_15055
routeros/poc/cve_2019_15055 at master · tenable/routeros · GitHubExploit;Third Party Advisory
-
https://forum.mikrotik.com/viewtopic.php?t=151603
v6.45.5 [stable] is released! - MikroTik
-
https://mikrotik.com/download/changelogs/testing-release-tree
MikroTik Routers and Wireless - SoftwareRelease Notes;Vendor Advisory
-
https://medium.com/tenable-techblog/rooting-routeros-with-a-usb-drive-16d7b8665f90
Rooting RouterOS with a USB Drive - Tenable TechBlog - MediumPress/Media Coverage;Third Party Advisory
Jump to