Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-30799: CWE-269 Improper Privilege Management in MikroTik RouterOS

0
Critical
VulnerabilityCVE-2023-30799cvecve-2023-30799cwe-269
Published: Wed Jul 19 2023 (07/19/2023, 14:56:17 UTC)
Source: CVE Database V5
Vendor/Project: MikroTik
Product: RouterOS

Description

MikroTik RouterOS stable before 6.49.7 and long-term through 6.48.6 are vulnerable to a privilege escalation issue. A remote and authenticated attacker can escalate privileges from admin to super-admin on the Winbox or HTTP interface. The attacker can abuse this vulnerability to execute arbitrary code on the system.

AI-Powered Analysis

AILast updated: 11/21/2025, 16:28:46 UTC

Technical Analysis

CVE-2023-30799 is a critical security vulnerability classified under CWE-269 (Improper Privilege Management) affecting MikroTik RouterOS stable versions before 6.49.7 and long-term versions through 6.48.6. The flaw allows a remote attacker who has authenticated with admin privileges on the Winbox or HTTP management interfaces to escalate their privileges to super-admin. This escalation enables the attacker to execute arbitrary code on the device, potentially leading to full system compromise. The vulnerability arises from insufficient checks or controls in privilege management, allowing an attacker to bypass intended access restrictions. The attack vector is network-based, requiring no user interaction but does require valid admin credentials, which could be obtained through credential theft, phishing, or other means. The vulnerability affects core network infrastructure devices that manage routing and network traffic, making exploitation highly impactful. The CVSS v3.1 score is 9.1, reflecting high exploitability (network attack vector, low attack complexity) and severe impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the critical nature and widespread use of MikroTik RouterOS make this a significant threat. The lack of patch links in the provided data suggests users should verify the latest updates from MikroTik and apply them promptly.

Potential Impact

The impact on European organizations is substantial due to the widespread use of MikroTik RouterOS in enterprise networks, ISPs, and critical infrastructure. Successful exploitation allows attackers to gain super-admin privileges, leading to full control over the router, including the ability to intercept, modify, or disrupt network traffic. This can result in data breaches, network outages, and lateral movement within corporate networks. Confidentiality is at risk as attackers can capture sensitive data passing through the router. Integrity is compromised by potential unauthorized configuration changes or injection of malicious code. Availability can be affected through denial-of-service conditions or persistent backdoors. Given the critical role of routers in network security and operations, this vulnerability could facilitate large-scale attacks or espionage campaigns targeting European entities. Organizations with exposed management interfaces or weak credential management are particularly vulnerable.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately verify their MikroTik RouterOS version and upgrade to version 6.49.7 or later, or the latest long-term release that addresses this issue. If immediate patching is not possible, restrict access to Winbox and HTTP management interfaces using network segmentation and firewall rules, allowing only trusted IP addresses. Implement strong authentication mechanisms, including multi-factor authentication where supported, to reduce the risk of credential compromise. Regularly audit and rotate administrative credentials and monitor logs for suspicious login attempts or privilege escalations. Disable unnecessary management interfaces or services to reduce the attack surface. Employ network intrusion detection systems to identify anomalous activities related to router management. Finally, maintain up-to-date backups of router configurations to enable rapid recovery if compromise occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2023-04-18T10:31:45.962Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69209279b50ca2a0e366a945

Added to database: 11/21/2025, 4:25:29 PM

Last enriched: 11/21/2025, 4:28:46 PM

Last updated: 11/21/2025, 6:40:55 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats