{"id":5139,"date":"2023-07-26T19:55:05","date_gmt":"2023-07-26T17:55:05","guid":{"rendered":"https:\/\/sajberinfo.com\/?p=5139"},"modified":"2023-07-26T19:55:05","modified_gmt":"2023-07-26T17:55:05","slug":"mikrotik-super-admin-ranjivost-cve-2023-30799","status":"publish","type":"post","link":"https:\/\/sajberinfo.com\/en\/2023\/07\/26\/mikrotik-super-admin-ranjivost-cve-2023-30799\/","title":{"rendered":"MikroTik Super Admin ranjivost CVE-2023-30799"},"content":{"rendered":"<p><span style=\"font-size: 14pt;\">Kriti\u010dna <em>MikroTik Super Admin<\/em> ranjivost <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-30799\" target=\"_blank\" rel=\"noopener\"><em>CVE-2023-30799<\/em><\/a> dovela je preko <em>900.000<\/em> <em>MikroTik RouterOS <\/em>ure\u0111aja u ozbiljan rizik, omogu\u0107avaju\u0107i napada\u010dima da steknu privilegije \u201c<em>super administratora<\/em>\u201d i preuzmu potpunu kontrolu nad ure\u0111ajima bez otkrivanja.<\/span><\/p>\n<div id=\"attachment_5142\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-5142\" class=\"size-full wp-image-5142\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/07\/wp10283609-mikrotik-wallpapers.jpg\" alt=\"mikrotik\" width=\"1024\" height=\"608\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/07\/wp10283609-mikrotik-wallpapers.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/07\/wp10283609-mikrotik-wallpapers-300x178.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/07\/wp10283609-mikrotik-wallpapers-768x456.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/07\/wp10283609-mikrotik-wallpapers-18x12.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-5142\" class=\"wp-caption-text\"><em>MikroTik Super Admin ranjivost CVE-2023-30799; Source: <\/em><a href=\"https:\/\/wallpapercave.com\/w\/wp10283609\" target=\"_blank\" rel=\"noopener\"><em>Wallpapercave<\/em><\/a><\/p><\/div>\n<h2><span style=\"font-size: 14pt;\"><strong><em>MikroTik <\/em>ranjivost <em>CVE-2023-30799<\/em><\/strong><\/span><\/h2>\n<p><span style=\"font-size: 14pt;\">Ranjivost je otkrio sigurnosni istra\u017eiva\u010d kompanije <em>Google Tavis Ormandy<\/em>, a ona omogu\u0107ava <a href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/19\/hakeri-crni-sesiri-epizoda-3\/\" target=\"_blank\" rel=\"nofollow noopener\">zlonamjernim napada\u010dima<\/a> da daljinski sa postoje\u0107im administratorskim nalogom podignu svoje privilegije preko <em>Winbox<\/em> ili <em>HTTP<\/em> pristupa. Iako je za eksploataciju potreban administratorski nalog, prisustvo dobro poznatog podrazumijevanog \u201c<em>admin<\/em>\u201d korisnika u <em>MikroTik RouterOS <\/em>\u00a0operativnom sistemu izaziva zna\u010dajnu zabrinutost.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Sigurnosni istra\u017eiva\u010di su do\u0161li do podatka da bi ova ranjivost mogla da ima dalekose\u017ean uticaj, jer je oko <em>450.000<\/em> ure\u0111aja dostupno preko <em>HTTP<\/em> pristupa. Ako se na to doda i broj ure\u0111aja kojima se mo\u017ee pristupiti kori\u0161tenjem <em>Winbox<\/em> pristupa, broj pogo\u0111enih ure\u0111aja raste na oko <em>900.000<\/em> ure\u0111aja, \u0161to je veoma zna\u010dajan broj.<\/span><\/p>\n<div id=\"attachment_5144\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-5144\" class=\"size-full wp-image-5144\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/07\/MikroTik-900000.webp\" alt=\"MikroTik router 900000\" width=\"1024\" height=\"444\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/07\/MikroTik-900000.webp 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/07\/MikroTik-900000-300x130.webp 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/07\/MikroTik-900000-768x333.webp 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/07\/MikroTik-900000-18x8.webp 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-5144\" class=\"wp-caption-text\"><em>Broj pogo\u0111enih MikroTik ure\u0111aja; Source: Shodan Search Engine<\/em><\/p><\/div>\n<blockquote><p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;\"><em>CVE-2023-30799 zahteva autentifikaciju. U stvari, sama ranjivost je jednostavna eskalacija privilegija sa administratora na \u201csuper-admin\u201d \u0161to rezultira pristupom proizvoljnom pozivu funkcije. Ali ovu ranjivost ne treba odbaciti, jer je potrebna autentifikacija. Vjerujemo da je ovo opasna ranjivost. Pribavljanje akreditiva za RouterOS sisteme je lak\u0161e nego \u0161to bi se moglo o\u010dekivati.<\/em><\/span><\/p>\n<p style=\"text-align: right;\"><span style=\"font-size: 14pt;\"><em>\u00a0<\/em><\/span><span style=\"font-size: 14pt;\"><em>&#8211; <\/em><a href=\"https:\/\/vulncheck.com\/blog\/mikrotik-foisted-revisited\" target=\"_blank\" rel=\"noopener\"><em>Sigurnosni istra\u017eiva\u010d Jacob Baines, Vulncheck<\/em><\/a><em> &#8211;<\/em><\/span><\/p>\n<\/blockquote>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;\">Ranjivost <em>CVE-2023-30799<\/em> daje napada\u010dima privilegije \u201c<em>Super Admin<\/em>\u201d, nude\u0107i neograni\u010den pristup operativnom sistemu <em>RouterOS<\/em>. Kori\u0161tenjem ovog pove\u0107anja privilegija, napada\u010di mogu da manipuli\u0161u pozivima funkcija, omogu\u0107avaju\u0107i im da kontroli\u0161u osnovni softver i izbjegnu otkrivanje.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\"><em>MikroTik<\/em> podrazumijevani administratorski korisnik, koji se \u010desto ne uklanja kako je preporu\u010deno, ostaje ta\u010dka ranjivosti. Pored toga, nedostatak zahteva za ja\u010danje administratorske lozinke izla\u017ee korisnike napadima grube sile (eng. <em>brute-force<\/em>), pri \u010demu <em>MikroTik<\/em> ne nudi nikakvu za\u0161titu osim na <em>SSH<\/em> interfejsu.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-size: 14pt;\"><strong>Za\u0161tita<\/strong><\/span><\/h3>\n<p><span style=\"font-size: 14pt;\">Iako je ranjivost prvobitno otkrivena bez identifikatora ranjivosti u junu 2022. godine, kompanija <\/span><span style=\"font-size: 14pt;\"><em>MikroTik<\/em> je izdala sigurnosno a\u017euriranje koje rije\u0161ava ovaj problem u oktbru 2022. godine za\u00a0 <em>RouterOS stable<\/em> <em>v6.49.7<\/em> i 19. jula 2023. godine za <em>RouterOS<\/em> <em>Long-term<\/em> <em>v6.49.8<\/em>.<\/span><\/p>\n<div id=\"attachment_5145\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-5145\" class=\"size-full wp-image-5145\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/07\/MikroTik-RouterOS-versions.webp\" alt=\"MikroTik versions\" width=\"1024\" height=\"538\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/07\/MikroTik-RouterOS-versions.webp 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/07\/MikroTik-RouterOS-versions-300x158.webp 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/07\/MikroTik-RouterOS-versions-768x404.webp 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/07\/MikroTik-RouterOS-versions-18x9.webp 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-5145\" class=\"wp-caption-text\"><em>Zastupljenost MikroTik RouterOS verzija; Source: Shodan Search Engine<\/em><\/p><\/div>\n<p><span style=\"font-size: 14pt;\">Korisnici <em>MikroTik<\/em> ure\u0111aja moraju odmah da preduzmu mjere kako bi se za\u0161titili od ove ranjivosti, a to zna\u010di primjena najnovijeg <em>RouterOS<\/em> a\u017euriranja <em>v6.49.8 (stable)<\/em> ili <em>v7.x stable<\/em>. Da bi pobolj\u0161ali bezbjednost, korisnici bi trebalo da uklone administrativne pristupe sa Interneta, ograni\u010de <em>IP<\/em> adrese za prijavljivanje na listu dozvoljenih, onemogu\u0107e <em>Winbox<\/em> u korist <em>SSH<\/em> pristupa i konfiguri\u0161u <em>SSH<\/em> da koristi javne\/privatne klju\u010deve umjesto lozinki. Neuspjeh u rje\u0161avanju ranjivosti mo\u017ee dovesti do katastrofalnih posljedica, jer zlonamjerni akteri mogu poku\u0161ati da je brzo iskoriste. Korisnici jo\u0161 jednom mogu pogledati preporu\u010deno uputstvo za za\u0161titu <em>MikroTik<\/em> ure\u0111aja <a href=\"https:\/\/wiki.mikrotik.com\/wiki\/Manual:Securing_Your_Router\" target=\"_blank\" rel=\"noopener\">ovdje<\/a>.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Kriti\u010dna MikroTik Super Admin ranjivost CVE-2023-30799 dovela je preko 900.000 MikroTik RouterOS ure\u0111aja u ozbiljan rizik, omogu\u0107avaju\u0107i napada\u010dima da steknu privilegije \u201csuper administratora\u201d i preuzmu potpunu kontrolu nad ure\u0111ajima bez otkrivanja. MikroTik ranjivost CVE-2023-30799&#46;&#46;&#46;<\/p>","protected":false},"author":1,"featured_media":5142,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[484,486,487,291,485,488],"class_list":["post-5139","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hronike","tag-mikrotik","tag-network","tag-routeros","tag-ssh","tag-super-admin","tag-winbox"],"_links":{"self":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/5139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/comments?post=5139"}],"version-history":[{"count":0,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/5139\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media\/5142"}],"wp:attachment":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media?parent=5139"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/categories?post=5139"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/tags?post=5139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}