Vulnerability Description
MikroTik RouterOS versions Stable 6.43.12 and below, Long-term 6.42.12 and below, and Testing 6.44beta75 and below are vulnerable to an authenticated, remote directory traversal via the HTTP or Winbox interfaces. An authenticated, remote attack can use this vulnerability to read and write files outside of the sandbox directory (/rw/disk).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mikrotik | Routeros | <= 6.42.12 |
Related Weaknesses (CWE)
References
- https://www.tenable.com/security/research/tra-2019-16ExploitThird Party Advisory
- https://www.tenable.com/security/research/tra-2019-16ExploitThird Party Advisory
FAQ
What is CVE-2019-3943?
CVE-2019-3943 is a vulnerability with a CVSS score of 8.1 (HIGH). MikroTik RouterOS versions Stable 6.43.12 and below, Long-term 6.42.12 and below, and Testing 6.44beta75 and below are vulnerable to an authenticated, remote directory traversal via the HTTP or Winbox...
How severe is CVE-2019-3943?
CVE-2019-3943 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-3943?
Check the references section above for vendor advisories and patch information. Affected products include: Mikrotik Routeros.