Cleartext Password Storage Vulnerability in MikroTik WinBox

Cleartext Password Storage Vulnerability in MikroTik WinBox

CVE-2020-5721 · MEDIUM Severity

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

MikroTik WinBox 3.22 and below stores the user's cleartext password in the settings.cfg.viw configuration file when the Keep Password field is set and no Master Password is set. Keep Password is set by default and, by default Master Password is not set. An attacker with access to the configuration file can extract a username and password to gain access to the router.

Learn more about our User Device Pen Test.