Community discussions

MikroTik App
 
User avatar
normis
MikroTik Support
MikroTik Support
Topic Author
Posts: 26387
Joined: Fri May 28, 2004 11:04 am
Location: Riga, Latvia

CVE-2023-30799

Thu Jul 27, 2023 1:38 pm

 
ksteink
Frequent Visitor
Frequent Visitor
Posts: 80
Joined: Thu Mar 31, 2016 6:54 pm

Re: CVE-2023-30799

Thu Jul 27, 2023 4:05 pm

Very informative. Thanks :)
 
User avatar
rextended
Forum Guru
Forum Guru
Posts: 12014
Joined: Tue Feb 25, 2014 12:49 pm
Location: Italy
Contact:

Re: CVE-2023-30799

Thu Jul 27, 2023 4:42 pm

 
msatter
Forum Guru
Forum Guru
Posts: 2912
Joined: Tue Feb 18, 2014 12:56 am
Location: Netherlands / Nīderlande

Re: CVE-2023-30799

Thu Jul 27, 2023 9:51 pm

Thanks. :-)
 
User avatar
k6ccc
Forum Guru
Forum Guru
Posts: 1500
Joined: Fri May 13, 2016 12:01 am
Location: Glendora, CA, USA (near Los Angeles)
Contact:

Re: CVE-2023-30799

Fri Jul 28, 2023 6:54 pm

Interesting, but pretty much a non-issue since it requires the actor to be logged in with full admin privilege anyway...
 
msatter
Forum Guru
Forum Guru
Posts: 2912
Joined: Tue Feb 18, 2014 12:56 am
Location: Netherlands / Nīderlande

Re: CVE-2023-30799

Fri Jul 28, 2023 8:33 pm

Example: I hire a expert to setup my router. That person needs access on admin level and that person could gain "super-admin" level and makes changes that are not logged and normally not allowed.

When the temp. account is deleted the changes stay in place.

My impression from what I read here: https://vulncheck.com/blog/mikrotik-foisted-revisited
 
sinisa
just joined
Posts: 24
Joined: Sun Apr 17, 2011 12:46 am

Re: CVE-2023-30799

Fri Jul 28, 2023 11:02 pm

I would soooooo love to take a peek under the hood :)
Might even try to break into my own 750G...
 
mipa
just joined
Posts: 3
Joined: Sun Oct 24, 2021 3:55 pm

Re: CVE-2023-30799

Sat Jul 29, 2023 5:55 pm

Been there done that.
By the if only most users remember that you can get an email sent to you when the router is accessed with admin credentials.
Though I agree that the way they built the Kernel now the router is more secure
 
infabo
Long time Member
Long time Member
Posts: 695
Joined: Thu Nov 12, 2020 12:07 pm

Re: CVE-2023-30799

Fri Sep 15, 2023 3:20 pm

In short, a RouterOS admin with full rights can already do anything in RouterOS and has full control over all configuration, but should not be able to run other code or inject other files in the subsystem of RouterOS.
A trivializing sentence at the end.

Someone may gain access to the device by admin user and could change any of the configuration. Most of the time these intruders would not hit "/system/reset-configuration". They rather would open some ports or enable some services, so they can enter the network further. But I would still be able to review or observe changes with "/export" or "/export verbose". Make a diff and see immediately what changed. Could be automated.

But when someone gains access to a real root shell and uploads any possible binary one can think of. Adds the binary to a init-script so it starts on boot. Or manipulate configuration on the underlying OS - these are not in any kind visible in the "/export verbose" output.

None of this would be noticed. Nor could it be noticed. You could just simply netinstall the device, if you see e.g. signs of unusual logins from unusual source/ip or time of day.
In short - very low risk issue.
As someone working for Mikrotik, you should not play this down.
 
User avatar
normis
MikroTik Support
MikroTik Support
Topic Author
Posts: 26387
Joined: Fri May 28, 2004 11:04 am
Location: Riga, Latvia

Re: CVE-2023-30799

Fri Sep 15, 2023 3:22 pm

You don't need any CVE for that. Please re-read the original post.
In theory you could even take the router apart and re-solder some chips on it. What is the point calling such situations "vulnerabilities"? If your device has full admin access to malicious parties, ALL IS LOST already
 
pe1chl
Forum Guru
Forum Guru
Posts: 10248
Joined: Mon Jun 08, 2015 12:09 pm

Re: CVE-2023-30799

Fri Sep 15, 2023 4:33 pm

You could also just give in and grant users the capability to get a Linux shell, of course protected by a flag in device-mode and a warning that routers with this enabled cannot be supported via the usual channels.
That would likely end the constant search of "vulnerabilities" to get that access. And having it visible (in export and device-mode) also increases awareness.
 
User avatar
Amm0
Forum Guru
Forum Guru
Posts: 3510
Joined: Sun May 01, 2016 7:12 pm
Location: California

Re: CVE-2023-30799

Fri Sep 15, 2023 5:32 pm

That would likely end the constant search of "vulnerabilities" to get that access.
I'm not sure about that. I've been following `curl` maintainer's sage with MITRE — conclusion was "panic by default": https://daniel.haxx.se/blog/2023/09/05/ ... ollow-ups/

One can also enable RADIUS logins with 2FA, if worried about vulnerabilities that start with "admin with valid credentials" cases.
 
Lupin
Member Candidate
Member Candidate
Posts: 267
Joined: Mon Feb 16, 2009 10:22 pm
Location: Italy

Re: CVE-2023-30799

Fri Sep 15, 2023 7:28 pm

You don't need any CVE for that. Please re-read the original post.
In theory you could even take the router apart and re-solder some chips on it. What is the point calling such situations "vulnerabilities"? If your device has full admin access to malicious parties, ALL IS LOST already
Could you not integrate a feature into RouterOS, to check that the subsystem has not been manipulated?

In the case scenario that a breach has been made but I still have remote access and I change credentials and upgrade. I would have the ability to avoid sending out technicians to replace or netinstall equipment
 
pe1chl
Forum Guru
Forum Guru
Posts: 10248
Joined: Mon Jun 08, 2015 12:09 pm

Re: CVE-2023-30799

Fri Sep 15, 2023 7:54 pm

There is System->Packages->Check installation but it is completely unclear what it does and what it doesn't do.
 
User avatar
normis
MikroTik Support
MikroTik Support
Topic Author
Posts: 26387
Joined: Fri May 28, 2004 11:04 am
Location: Riga, Latvia

Re: CVE-2023-30799

Fri Sep 15, 2023 7:58 pm

We have already done that, it's called "device mode" https://help.mikrotik.com/docs/display/ROS/Device-mode

It will lock down your device if any suspicious activity is detected

Who is online

Users browsing this forum: No registered users and 11 guests