CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:S/C:C/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
81.4%
MikroTik RouterOS versions Stable 6.43.12 and below, Long-term 6.42.12 and below, and Testing 6.44beta75 and below are vulnerable to an authenticated, remote directory traversal via the HTTP or Winbox interfaces. An authenticated, remote attack can use this vulnerability to read and write files outside of the sandbox directory (/rw/disk).
This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(502043);
script_version("1.1");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/02/28");
script_cve_id("CVE-2019-3943");
script_name(english:"MikroTik RouterOS Path Traversal (CVE-2019-3943)");
script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
script_set_attribute(attribute:"description", value:
"MikroTik RouterOS versions Stable 6.43.12 and below, Long-term 6.42.12
and below, and Testing 6.44beta75 and below are vulnerable to an
authenticated, remote directory traversal via the HTTP or Winbox
interfaces. An authenticated, remote attack can use this vulnerability
to read and write files outside of the sandbox directory (/rw/disk).
This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.");
script_set_attribute(attribute:"see_also", value:"https://www.tenable.com/security/research/tra-2019-16");
script_set_attribute(attribute:"solution", value:
"Refer to the vendor advisory.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:P/A:N");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-3943");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_cwe_id(22);
script_set_attribute(attribute:"vuln_publication_date", value:"2019/04/10");
script_set_attribute(attribute:"patch_publication_date", value:"2019/04/10");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/02/27");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.41:rc31");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.41:rc32");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.41:rc34");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.41:rc37");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.41:rc38");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.41:rc44");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.41:rc47");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.41:rc50");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.41:rc52");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.41:rc56");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.41:rc61");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.41:rc66");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc11");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc12");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc14");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc15");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc18");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc20");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc23");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc24");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc27");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc28");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc2");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc30");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc35");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc37");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc39");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc41");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc43");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc46");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc48");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc49");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc52");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc56");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc5");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc6");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.42:rc9");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc11");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc12");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc14");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc17");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc19");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc21");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc23");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc27");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc29");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc32");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc34");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc3");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc40");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc42");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc44");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc45");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc4");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc51");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc56");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc5");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc64");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc66");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc6");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.43:rc7");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.44:beta14");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.44:beta17");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.44:beta20");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.44:beta28");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.44:beta39");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.44:beta40");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.44:beta50");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.44:beta54");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.44:beta61");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.44:beta6");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.44:beta75");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros:6.44:beta9");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mikrotik:routeros");
script_set_attribute(attribute:"generated_plugin", value:"former");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Tenable.ot");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("tenable_ot_api_integration.nasl");
script_require_keys("Tenable.ot/MikroTik");
exit(0);
}
include('tenable_ot_cve_funcs.inc');
get_kb_item_or_exit('Tenable.ot/MikroTik');
var asset = tenable_ot::assets::get(vendor:'MikroTik');
var vuln_cpes = {
"cpe:/o:mikrotik:routeros":
{"versionEndIncluding" : "6.43.12", "family" : "RouterOS"},
"cpe:/o:mikrotik:routeros:6.41:rc31":
{"versionEndIncluding": "6.41rc31", "versionStartIncluding": "6.41rc31", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.41:rc32":
{"versionEndIncluding": "6.41rc32", "versionStartIncluding": "6.41rc32", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.41:rc34":
{"versionEndIncluding": "6.41rc34", "versionStartIncluding": "6.41rc34", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.41:rc37":
{"versionEndIncluding": "6.41rc37", "versionStartIncluding": "6.41rc37", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.41:rc38":
{"versionEndIncluding": "6.41rc38", "versionStartIncluding": "6.41rc38", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.41:rc44":
{"versionEndIncluding": "6.41rc44", "versionStartIncluding": "6.41rc44", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.41:rc47":
{"versionEndIncluding": "6.41rc47", "versionStartIncluding": "6.41rc47", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.41:rc50":
{"versionEndIncluding": "6.41rc50", "versionStartIncluding": "6.41rc50", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.41:rc52":
{"versionEndIncluding": "6.41rc52", "versionStartIncluding": "6.41rc52", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.41:rc56":
{"versionEndIncluding": "6.41rc56", "versionStartIncluding": "6.41rc56", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.41:rc61":
{"versionEndIncluding": "6.41rc61", "versionStartIncluding": "6.41rc61", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.41:rc66":
{"versionEndIncluding": "6.41rc66", "versionStartIncluding": "6.41rc66", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.42:rc11":
{"versionEndIncluding": "6.42rc11", "versionStartIncluding": "6.42rc11", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.42:rc12":
{"versionEndIncluding": "6.42rc12", "versionStartIncluding": "6.42rc12", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.42:rc14":
{"versionEndIncluding": "6.42rc14", "versionStartIncluding": "6.42rc14", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.42:rc15":
{"versionEndIncluding": "6.42rc15", "versionStartIncluding": "6.42rc15", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.42:rc18":
{"versionEndIncluding": "6.42rc18", "versionStartIncluding": "6.42rc18", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.42:rc2":
{"versionEndIncluding": "6.42rc2", "versionStartIncluding": "6.42rc2", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.42:rc20":
{"versionEndIncluding": "6.42rc20", "versionStartIncluding": "6.42rc20", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.42:rc23":
{"versionEndIncluding": "6.42rc23", "versionStartIncluding": "6.42rc23", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.42:rc24":
{"versionEndIncluding": "6.42rc24", "versionStartIncluding": "6.42rc24", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.42:rc27":
{"versionEndIncluding": "6.42rc27", "versionStartIncluding": "6.42rc27", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.42:rc28":
{"versionEndIncluding": "6.42rc28", "versionStartIncluding": "6.42rc28", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.42:rc30":
{"versionEndIncluding": "6.42rc30", "versionStartIncluding": "6.42rc30", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.42:rc35":
{"versionEndIncluding": "6.42rc35", "versionStartIncluding": "6.42rc35", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.42:rc37":
{"versionEndIncluding": "6.42rc37", "versionStartIncluding": "6.42rc37", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.42:rc39":
{"versionEndIncluding": "6.42rc39", "versionStartIncluding": "6.42rc39", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.42:rc41":
{"versionEndIncluding": "6.42rc41", "versionStartIncluding": "6.42rc41", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.42:rc43":
{"versionEndIncluding": "6.42rc43", "versionStartIncluding": "6.42rc43", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.42:rc46":
{"versionEndIncluding": "6.42rc46", "versionStartIncluding": "6.42rc46", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.42:rc48":
{"versionEndIncluding": "6.42rc48", "versionStartIncluding": "6.42rc48", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.42:rc49":
{"versionEndIncluding": "6.42rc49", "versionStartIncluding": "6.42rc49", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.42:rc5":
{"versionEndIncluding": "6.42rc5", "versionStartIncluding": "6.42rc5", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.42:rc52":
{"versionEndIncluding": "6.42rc52", "versionStartIncluding": "6.42rc52", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.42:rc56":
{"versionEndIncluding": "6.42rc56", "versionStartIncluding": "6.42rc56", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.42:rc6":
{"versionEndIncluding": "6.42rc6", "versionStartIncluding": "6.42rc6", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.42:rc9":
{"versionEndIncluding": "6.42rc9", "versionStartIncluding": "6.42rc9", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.43:rc11":
{"versionEndIncluding": "6.43rc11", "versionStartIncluding": "6.43rc11", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.43:rc12":
{"versionEndIncluding": "6.43rc12", "versionStartIncluding": "6.43rc12", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.43:rc14":
{"versionEndIncluding": "6.43rc14", "versionStartIncluding": "6.43rc14", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.43:rc17":
{"versionEndIncluding": "6.43rc17", "versionStartIncluding": "6.43rc17", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.43:rc19":
{"versionEndIncluding": "6.43rc19", "versionStartIncluding": "6.43rc19", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.43:rc21":
{"versionEndIncluding": "6.43rc21", "versionStartIncluding": "6.43rc21", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.43:rc23":
{"versionEndIncluding": "6.43rc23", "versionStartIncluding": "6.43rc23", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.43:rc27":
{"versionEndIncluding": "6.43rc27", "versionStartIncluding": "6.43rc27", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.43:rc29":
{"versionEndIncluding": "6.43rc29", "versionStartIncluding": "6.43rc29", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.43:rc3":
{"versionEndIncluding": "6.43rc3", "versionStartIncluding": "6.43rc3", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.43:rc32":
{"versionEndIncluding": "6.43rc32", "versionStartIncluding": "6.43rc32", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.43:rc34":
{"versionEndIncluding": "6.43rc34", "versionStartIncluding": "6.43rc34", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.43:rc4":
{"versionEndIncluding": "6.43rc4", "versionStartIncluding": "6.43rc4", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.43:rc40":
{"versionEndIncluding": "6.43rc40", "versionStartIncluding": "6.43rc40", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.43:rc42":
{"versionEndIncluding": "6.43rc42", "versionStartIncluding": "6.43rc42", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.43:rc44":
{"versionEndIncluding": "6.43rc44", "versionStartIncluding": "6.43rc44", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.43:rc45":
{"versionEndIncluding": "6.43rc45", "versionStartIncluding": "6.43rc45", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.43:rc5":
{"versionEndIncluding": "6.43rc5", "versionStartIncluding": "6.43rc5", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.43:rc51":
{"versionEndIncluding": "6.43rc51", "versionStartIncluding": "6.43rc51", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.43:rc56":
{"versionEndIncluding": "6.43rc56", "versionStartIncluding": "6.43rc56", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.43:rc6":
{"versionEndIncluding": "6.43rc6", "versionStartIncluding": "6.43rc6", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.43:rc64":
{"versionEndIncluding": "6.43rc64", "versionStartIncluding": "6.43rc64", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.43:rc66":
{"versionEndIncluding": "6.43rc66", "versionStartIncluding": "6.43rc66", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.43:rc7":
{"versionEndIncluding": "6.43rc7", "versionStartIncluding": "6.43rc7", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.44:beta14":
{"versionEndIncluding": "6.44beta14", "versionStartIncluding": "6.44beta14", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.44:beta17":
{"versionEndIncluding": "6.44beta17", "versionStartIncluding": "6.44beta17", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.44:beta20":
{"versionEndIncluding": "6.44beta20", "versionStartIncluding": "6.44beta20", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.44:beta28":
{"versionEndIncluding": "6.44beta28", "versionStartIncluding": "6.44beta28", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.44:beta39":
{"versionEndIncluding": "6.44beta39", "versionStartIncluding": "6.44beta39", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.44:beta40":
{"versionEndIncluding": "6.44beta40", "versionStartIncluding": "6.44beta40", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.44:beta50":
{"versionEndIncluding": "6.44beta50", "versionStartIncluding": "6.44beta50", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.44:beta54":
{"versionEndIncluding": "6.44beta54", "versionStartIncluding": "6.44beta54", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.44:beta6":
{"versionEndIncluding": "6.44beta6", "versionStartIncluding": "6.44beta6", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.44:beta61":
{"versionEndIncluding": "6.44beta61", "versionStartIncluding": "6.44beta61", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.44:beta75":
{"versionEndIncluding": "6.44beta75", "versionStartIncluding": "6.44beta75", "family": "RouterOS"},
"cpe:/o:mikrotik:routeros:6.44:beta9":
{"versionEndIncluding": "6.44beta9", "versionStartIncluding": "6.44beta9", "family": "RouterOS"}
};
tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_HOLE);
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:S/C:C/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
81.4%