Security
 

CVE-2024-54772

Issue Summary

A vulnerability has been identified in the WinBox service, where a discrepancy in response size between connection attempts with valid and invalid usernames allows attackers to confirm if user accounts exists via brute forcing the login process. In other words, when attacker tries to log into the device, by examining the response, the attacker can deduce if such a user exists on the device. Even if username is found, password still needs to be guessed as well.

Affected Versions

RouterOS versions prior to 6.49.18 and 7.18.

Recommended Actions

Update RouterOS – Upgrade to 6.49.18, 7.18, or a newer version to patch the vulnerability. Monitor for unusual login attempts – Review router logs for suspicious authentication activity and take action accordingly.

Mitigation strategies for devices that cannot be updated immediately

Restrict WinBox Access. Firewall the WinBox port on public interfaces and untrusted networks. Limit connections to trusted IP addresses using the “IP → Services” menu to specify allowed sources (e.g., your LAN and trusted public IPs).

Use additional protection methods if access from untrusted networks is necessary

Port Knocking: https://help.mikrotik.com/docs/spaces/ROS/pages/154042369/Port+knocking

Brute-Force Prevention: https://help.mikrotik.com/docs/spaces/ROS/pages/268337176/Bruteforce+prevention

Secure MAC-WinBox Connections: Restrict MAC-WinBox connections to trusted interfaces using:

/tool mac-server mac-winbox set allowed-interface-list=<trusted-interface-list>

If your device is running the default configuration with firewall enabled, WinBox service is already limited to LAN access. In this case, the only potential attack vector would be internal network threats.

For more details, please see:

https://help.mikrotik.com/docs/spaces/ROS/pages/167706788/Default+configurations