Skip to main content

CVE-2018-14847: n/a in n/a

Critical
VulnerabilityCVE-2018-14847cvecve-2018-14847
Published: Thu Aug 02 2018 (08/02/2018, 07:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.

AI-Powered Analysis

AILast updated: 06/22/2025, 07:06:58 UTC

Technical Analysis

CVE-2018-14847 is a critical directory traversal vulnerability affecting MikroTik RouterOS versions up to 6.42. This flaw exists in the WinBox management interface, which is used for remote configuration of MikroTik routers. The vulnerability allows unauthenticated remote attackers to read arbitrary files on the device, potentially exposing sensitive configuration data, credentials, or other critical information. Additionally, remote authenticated attackers can exploit this vulnerability to write arbitrary files, enabling them to modify router configurations or implant malicious files. The root cause is improper sanitization of user-supplied input in the WinBox interface, leading to directory traversal (CWE-22). The vulnerability can be exploited over the network without any authentication or user interaction, making it highly accessible to attackers. The CVSS v3.1 base score is 9.1 (critical), reflecting the high impact on confidentiality and integrity, with no impact on availability. Although no public exploits are known in the wild as of the publication date, the severity and ease of exploitation make this a significant threat to MikroTik router deployments. Given the widespread use of MikroTik devices in enterprise and ISP environments, exploitation could lead to unauthorized disclosure of sensitive data and unauthorized configuration changes, potentially compromising entire network infrastructures.

Potential Impact

For European organizations, this vulnerability poses a substantial risk due to the widespread deployment of MikroTik routers in small to medium enterprises, ISPs, and some critical infrastructure sectors. Successful exploitation could lead to leakage of sensitive network configuration details, including credentials and routing information, enabling further lateral movement or targeted attacks. The ability for authenticated attackers to write arbitrary files could allow persistent backdoors or malicious configurations, undermining network integrity and trust. This could disrupt business operations, compromise customer data, and damage organizational reputation. Critical sectors such as telecommunications, finance, and government agencies that rely on MikroTik devices for network management are particularly at risk. Furthermore, given the vulnerability requires no user interaction and can be exploited remotely, attackers can automate scanning and exploitation campaigns, increasing the likelihood of widespread compromise if patches are not applied promptly.

Mitigation Recommendations

1. Immediate patching: Organizations should upgrade MikroTik RouterOS to versions later than 6.42 where this vulnerability is fixed. If an upgrade is not immediately possible, apply any available vendor-recommended mitigations or workarounds. 2. Restrict WinBox access: Limit access to the WinBox management interface to trusted internal networks or specific IP addresses using firewall rules or access control lists to reduce exposure to unauthenticated attackers. 3. Network segmentation: Isolate management interfaces from general network traffic to minimize the attack surface. 4. Monitor logs and network traffic: Implement monitoring to detect unusual access patterns or attempts to exploit directory traversal, including unexpected file read/write operations on routers. 5. Use strong authentication and credentials: Although the vulnerability allows unauthenticated read access, ensuring strong authentication can help mitigate the risk of file write exploitation. 6. Disable WinBox if not required: If the WinBox interface is not essential, disable it to eliminate the attack vector. 7. Conduct regular vulnerability assessments: Continuously scan network devices for known vulnerabilities and configuration weaknesses to maintain security posture.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2018-08-02T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef647

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 6/22/2025, 7:06:58 AM

Last updated: 8/14/2025, 11:17:13 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats