Description
MikroTik Winbox 3.20 and below is vulnerable to man in the middle attacks. A man in the middle can downgrade the client's authentication protocol and recover the user's username and MD5 hashed password.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-13588 | MikroTik Winbox 3.20 and below is vulnerable to man in the middle attacks. A man in the middle can downgrade the client's authentication protocol and recover the user's username and MD5 hashed password. |
References
| Link | Providers |
|---|---|
| https://www.tenable.com/security/research/tra-2020-01 |
|
History
No history.
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2024-08-04T19:26:27.758Z
Reserved: 2019-01-03T00:00:00.000Z
Link: CVE-2019-3981
No data.
Status : Modified
Published: 2020-01-14T19:15:13.187
Modified: 2024-11-21T04:42:59.980
Link: CVE-2019-3981
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD