Initiatives pour
En tant qu'autorité nationale en matière de cybersécurité, le CCB a développé plusieurs initiatives destinées à des publics spécifiques, qui sont présentées ici.
Reference:
Advisory #2023-89
Version:
1.0
Affected software:
MikroTik RouterOS long-term versions prior to 6.49.8
MikroTik RouterOS stable versions 6.27 to version 6.49.6
Type:
Remote Code Execution
CVE/CVSS:
CVE-2023-30799
CVSS score : 9.1 (critical)
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
https://mikrotik.com/download/changelogs/long-term-release-tree
https://mikrotik.com/download/changelogs/stable-release-tree
https://www.bleepingcomputer.com/news/security/super-admin-elevation-bug-puts-900-000-mikrotik-devices-at-risk/
By successfully exploiting CVE-2023-30799, a remote and authenticated attacker could escalate privileges from admin to super-admin, which would enable them to execute arbitrary code.
It is important to note that admin credentials for RouterOS can be guessed relatively easily, because:
MikroTik RouterOS is the operating system of MikroTik RouterBOARD hardware. MikroTik RouterOS has different user privileges, including admin and Super Admin accounts. While an admin account has restricted elevated privileges, a Super Admin account gives full access to the RouterOS operating system.
CVE-2023-30799 is a vulnerability in RouterOS that could enable an attacker to elevate privileges from admin to Super Admin. This makes it possible for the attacker to make changes to the underlying operating system and/or hide activities from detection.
MikroTik recommends upgrading your software:
It is also considered good practice to: