8.1

CVE-2019-3943

Exploit
MikroTik RouterOS versions Stable 6.43.12 and below, Long-term 6.42.12 and below, and Testing 6.44beta75 and below are vulnerable to an authenticated, remote directory traversal via the HTTP or Winbox interfaces. An authenticated, remote attack can use this vulnerability to read and write files outside of the sandbox directory (/rw/disk).
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
MikrotikRouteros SwEditionltr Version <= 6.42.12
MikrotikRouteros SwEdition- Version <= 6.43.12
MikrotikRouteros Version6.41 Updaterc31 SwEditiontesting
MikrotikRouteros Version6.41 Updaterc32 SwEditiontesting
MikrotikRouteros Version6.41 Updaterc34 SwEditiontesting
MikrotikRouteros Version6.41 Updaterc37 SwEditiontesting
MikrotikRouteros Version6.41 Updaterc38 SwEditiontesting
MikrotikRouteros Version6.41 Updaterc44 SwEditiontesting
MikrotikRouteros Version6.41 Updaterc47 SwEditiontesting
MikrotikRouteros Version6.41 Updaterc50 SwEditiontesting
MikrotikRouteros Version6.41 Updaterc52 SwEditiontesting
MikrotikRouteros Version6.41 Updaterc56 SwEditiontesting
MikrotikRouteros Version6.41 Updaterc61 SwEditiontesting
MikrotikRouteros Version6.41 Updaterc66 SwEditiontesting
MikrotikRouteros Version6.42 Updaterc11 SwEditiontesting
MikrotikRouteros Version6.42 Updaterc12 SwEditiontesting
MikrotikRouteros Version6.42 Updaterc14 SwEditiontesting
MikrotikRouteros Version6.42 Updaterc15 SwEditiontesting
MikrotikRouteros Version6.42 Updaterc18 SwEditiontesting
MikrotikRouteros Version6.42 Updaterc2 SwEditiontesting
MikrotikRouteros Version6.42 Updaterc20 SwEditiontesting
MikrotikRouteros Version6.42 Updaterc23 SwEditiontesting
MikrotikRouteros Version6.42 Updaterc24 SwEditiontesting
MikrotikRouteros Version6.42 Updaterc27 SwEditiontesting
MikrotikRouteros Version6.42 Updaterc28 SwEditiontesting
MikrotikRouteros Version6.42 Updaterc30 SwEditiontesting
MikrotikRouteros Version6.42 Updaterc35 SwEditiontesting
MikrotikRouteros Version6.42 Updaterc37 SwEditiontesting
MikrotikRouteros Version6.42 Updaterc39 SwEditiontesting
MikrotikRouteros Version6.42 Updaterc41 SwEditiontesting
MikrotikRouteros Version6.42 Updaterc43 SwEditiontesting
MikrotikRouteros Version6.42 Updaterc46 SwEditiontesting
MikrotikRouteros Version6.42 Updaterc48 SwEditiontesting
MikrotikRouteros Version6.42 Updaterc49 SwEditiontesting
MikrotikRouteros Version6.42 Updaterc5 SwEditiontesting
MikrotikRouteros Version6.42 Updaterc52 SwEditiontesting
MikrotikRouteros Version6.42 Updaterc56 SwEditiontesting
MikrotikRouteros Version6.42 Updaterc6 SwEditiontesting
MikrotikRouteros Version6.42 Updaterc9 SwEditiontesting
MikrotikRouteros Version6.43 Updaterc11 SwEditiontesting
MikrotikRouteros Version6.43 Updaterc12 SwEditiontesting
MikrotikRouteros Version6.43 Updaterc14 SwEditiontesting
MikrotikRouteros Version6.43 Updaterc17 SwEditiontesting
MikrotikRouteros Version6.43 Updaterc19 SwEditiontesting
MikrotikRouteros Version6.43 Updaterc21 SwEditiontesting
MikrotikRouteros Version6.43 Updaterc23 SwEditiontesting
MikrotikRouteros Version6.43 Updaterc27 SwEditiontesting
MikrotikRouteros Version6.43 Updaterc29 SwEditiontesting
MikrotikRouteros Version6.43 Updaterc3 SwEditiontesting
MikrotikRouteros Version6.43 Updaterc32 SwEditiontesting
MikrotikRouteros Version6.43 Updaterc34 SwEditiontesting
MikrotikRouteros Version6.43 Updaterc4 SwEditiontesting
MikrotikRouteros Version6.43 Updaterc40 SwEditiontesting
MikrotikRouteros Version6.43 Updaterc42 SwEditiontesting
MikrotikRouteros Version6.43 Updaterc44 SwEditiontesting
MikrotikRouteros Version6.43 Updaterc45 SwEditiontesting
MikrotikRouteros Version6.43 Updaterc5 SwEditiontesting
MikrotikRouteros Version6.43 Updaterc51 SwEditiontesting
MikrotikRouteros Version6.43 Updaterc56 SwEditiontesting
MikrotikRouteros Version6.43 Updaterc6 SwEditiontesting
MikrotikRouteros Version6.43 Updaterc64 SwEditiontesting
MikrotikRouteros Version6.43 Updaterc66 SwEditiontesting
MikrotikRouteros Version6.43 Updaterc7 SwEditiontesting
MikrotikRouteros Version6.44 Updatebeta14 SwEditiontesting
MikrotikRouteros Version6.44 Updatebeta17 SwEditiontesting
MikrotikRouteros Version6.44 Updatebeta20 SwEditiontesting
MikrotikRouteros Version6.44 Updatebeta28 SwEditiontesting
MikrotikRouteros Version6.44 Updatebeta39 SwEditiontesting
MikrotikRouteros Version6.44 Updatebeta40 SwEditiontesting
MikrotikRouteros Version6.44 Updatebeta50 SwEditiontesting
MikrotikRouteros Version6.44 Updatebeta54 SwEditiontesting
MikrotikRouteros Version6.44 Updatebeta6 SwEditiontesting
MikrotikRouteros Version6.44 Updatebeta61 SwEditiontesting
MikrotikRouteros Version6.44 Updatebeta75 SwEditiontesting
MikrotikRouteros Version6.44 Updatebeta9 SwEditiontesting
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.58% 0.679
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.1 2.8 5.2
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
nvd@nist.gov 7.5 8 7.8
AV:N/AC:L/Au:S/C:C/I:P/A:N
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

CWE-23 Relative Path Traversal

The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.