Monday, May 19, 2025
HomeCyber Security NewsCritical MikroTik RouterOS Flaw Exposes 900,000 Systems to Cyber Attacks

Critical MikroTik RouterOS Flaw Exposes 900,000 Systems to Cyber Attacks

Published on

SIEM as a Service

Follow Us on Google News

MikroTik RouterOS were vulnerable to a privilege escalation vulnerability which was first disclosed in June 2022 at REcon. The vulnerability existed on the x86 Virtual Machines of RouterOS, where a root shell can be obtained.

However, the new CVE for this vulnerability was assigned only in the middle of July 2023 when researchers at Vulncheck published new exploits for this vulnerability that can exploit a wider range of Hardware.

MikroTik released patches for this vulnerability on their stable release version 6.49.7.

- Advertisement - Google News

Further investigations revealed that 6.49.7 was the most installed version of the RouterOS, followed by the 6.48.6 version.

Most installed RouterOS versions (Source: Vulncheck)

CVE-2023-30799: Privilege Escalation from Admin to Super Admin

This vulnerability exists due to improper privilege management on the RouterOS versions 6.49.7 through 6.48.6, allowing threat actors to escalate their privileges from admin to super-admin on the Winbox or HTTP interface.

This can lead to arbitrary code execution on the system by the threat actor. The CVSS score for this vulnerability was given as 9.1 (Critical). Reports indicated that more than 900K routers were vulnerable to CVE-2023-30799.

Authentication Required But Still Dangerous

Though this vulnerability requires authentication, it is easier to obtain the credentials as most installations do not change the default “admin” username. Things got even worse when RouterOS prompted their users to set a blank password in October 2021.

In addition to this, the RouterOS was also vulnerable to brute force attacks on their API port. Nearly 400K routers were exposing their API ports to the internet, which is less when compared to the Winbox or HTTP interface exposure.

Vulncheck has released a complete report on this vulnerability which mentions the origin, exploitation, and other information.

For optimal security, it is recommended that users promptly update to the latest version (6.49.8 or 7.x) and apply the necessary patch to address the vulnerability.

Stay up-to-date with the latest Cyber Security News; follow us on GoogleNewsLinkedinTwitterand Facebook.

Eswar
Eswar
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Pwn2Own Day 3: Zero-Day Exploits Windows 11, VMware ESXi, and Firefox

The Pwn2Own Berlin 2025 last day ended with impressive technological accomplishments, bringing the total...

GNU C(glibc) Vulnerability Let Attackers Execute Arbitrary Code on Millions of Linux Systems

Security researchers have disclosed a significant vulnerability in the GNU C Library (glibc), potentially...

Exploiting dMSA for Advanced Active Directory Persistence

Security researchers have identified new methods for achieving persistence in Active Directory environments by...

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Pwn2Own Day 3: Zero-Day Exploits Windows 11, VMware ESXi, and Firefox

The Pwn2Own Berlin 2025 last day ended with impressive technological accomplishments, bringing the total...

GNU C(glibc) Vulnerability Let Attackers Execute Arbitrary Code on Millions of Linux Systems

Security researchers have disclosed a significant vulnerability in the GNU C Library (glibc), potentially...

Exploiting dMSA for Advanced Active Directory Persistence

Security researchers have identified new methods for achieving persistence in Active Directory environments by...