{"vulnerability": "CVE-2023-30799", "sightings": [{"uuid": "daab5f50-6754-4579-ae80-d51bac8ef46b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lgazjvb7rm2p", "content": "", "creation_timestamp": "2025-01-21T14:05:49.213833Z"}, {"uuid": "a93b27b6-9e5c-4dfa-91da-8628e63998e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "https://t.me/habr_com_news/19909", "content": "\u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u0438\u0437 VulnCheck \u0432\u044b\u044f\u0441\u043d\u0438\u043b\u0438, \u0447\u0442\u043e \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0431\u0430\u0433 (\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2023-30799) \u0441 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0434\u043e \u00ab\u0421\u0443\u043f\u0435\u0440\u0430\u0434\u043c\u0438\u043d\u0430\u00bb (Super Admin) \u0441\u0442\u0430\u0432\u0438\u0442 \u043f\u043e\u0434 \u0443\u0433\u0440\u043e\u0437\u0443 926 \u0442\u044b\u0441. \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 MikroTik \u043f\u043e \u0432\u0441\u0435\u043c\u0443 \u043c\u0438\u0440\u0443.\n\n#\u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c #\u0442\u0435\u0445\u043d\u0438\u043a\u0430", "creation_timestamp": "2023-07-27T07:01:38.000000Z"}, {"uuid": "78a96623-4235-41fd-a896-717390a61e51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:43.000000Z"}, {"uuid": "fd74d6c9-4d8b-46d5-ae4a-409583f8724e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "https://t.me/mikrotik_rus/300", "content": "\ud83d\udea8 CVE-2023-30799", "creation_timestamp": "2023-07-20T11:10:28.000000Z"}, {"uuid": "af6dcd2b-f248-4666-b38c-7ec4c295ea89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "Telegram/I0hAgnRYYTC1y9bgXOtEEdG8u60nbzDCQqcUKiA5izDmWJ90", "content": "", "creation_timestamp": "2023-07-19T22:24:29.000000Z"}, {"uuid": "74049b94-883e-4c61-8fa4-fc4b148a4e6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "Telegram/YrKlEtmqZ5dizKgm6CMZIS4BN_YtiV82x3-igcBpPL-XNqk5", "content": "", "creation_timestamp": "2025-05-05T00:13:37.000000Z"}, {"uuid": "6027df63-ed5c-40ea-ad11-eed3f1c6d300", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "exploited", "source": "https://t.me/kasperskyb2b/769", "content": "\ud83d\udcf6 \u0421 \u043c\u0435\u0441\u0442 \u0440\u0430\u043f\u043e\u0440\u0442\u0443\u044e\u0442 \u043e \u043d\u043e\u0432\u043e\u0439-\u0441\u0442\u0430\u0440\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0440\u043e\u0443\u0442\u0435\u0440\u0430\u0445 MikroTik. CVE-2023-30799 (CVSS 9.2) \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0432\u0441\u0435 \u043c\u043e\u0434\u0435\u043b\u0438 \u0441 RouterOS \u0432\u043f\u043b\u043e\u0442\u044c \u0434\u043e 6.49.6.  \u041f\u0430\u0442\u0447 \u0434\u043e\u0441\u0442\u0443\u043f\u0435\u043d \u0441 \u043e\u043a\u0442\u044f\u0431\u0440\u044f \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 RouterOS stable 6.49.7, \u0430 \u0441\u0435\u0439\u0447\u0430\u0441 \u0432\u044b\u043f\u0443\u0449\u0435\u043d \u0434\u043b\u044f RouterOS Long-term 6.49.8.  \n\n\u0411\u0430\u0433 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044e, \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u043a\u0430\u043a \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440, \u043f\u043e\u0434\u043d\u044f\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0434\u043e \u0441\u0443\u043f\u0435\u0440\u0430\u0434\u043c\u0438\u043d\u0430.  \u042d\u0442\u0438 \u043f\u0440\u0430\u0432\u0430 \u043d\u0435 \u043f\u0440\u0435\u0434\u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u044b \u0434\u043b\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u0432\u043d\u043e\u0441\u0438\u0442\u044c \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0432 \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0443, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u0430\u0432\u0442\u043e\u0440 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430 \u0441\u043f\u0440\u0430\u0432\u0435\u0434\u043b\u0438\u0432\u043e \u043d\u0430\u0437\u044b\u0432\u0430\u0435\u0442 \u0441\u0432\u043e\u0439 PoC remote jailbreak.  \u0412\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0432\u0448\u0438\u0441\u044c \u0442\u0430\u043a\u0438\u043c\u0438 \u043f\u0440\u0430\u0432\u0430\u043c\u0438, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043d\u0430 \u0440\u043e\u0443\u0442\u0435\u0440\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0438 \u044d\u0444\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e \u0441\u043a\u0440\u044b\u0432\u0430\u0442\u044c \u0435\u0433\u043e \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c \u043e\u0442 \u0432\u043b\u0430\u0434\u0435\u043b\u044c\u0446\u0430. \u041a \u0441\u043e\u0436\u0430\u043b\u0435\u043d\u0438\u044e, \u044d\u0442\u043e\u0439 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u043a\u0430\u043a \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432\u043e \u043c\u043e\u0442\u0438\u0432\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a\u0438 (\u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u0441\u043e\u0437\u0434\u0430\u044e\u0442 \u0441\u0435\u0442\u044c \u0438\u0437 SOCKS proxy  \u0434\u043b\u044f \u0441\u0434\u0430\u0447\u0438 \u0432 \u0430\u0440\u0435\u043d\u0434\u0443), \u0442\u0430\u043a \u0438 APT (\u0437\u0430\u043c\u0435\u0442\u0430\u0442\u044c \u0441\u043b\u0435\u0434\u044b).\n\n\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043d\u0430 \u0441\u0430\u043c\u043e\u043c \u0434\u0435\u043b\u0435 \u043d\u0435 \u043c\u0430\u043b\u0430, \u0443\u0447\u0438\u0442\u044b\u0432\u0430\u044f \u0447\u0442\u043e \u0440\u043e\u0443\u0442\u0435\u0440\u044b MikroTik \u043f\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0441\u043e \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u043c \u0430\u043a\u043a\u0430\u0443\u043d\u0442\u043e\u043c admin, \u043d\u0435 \u0437\u0430\u0449\u0438\u0449\u0430\u044e\u0442 \u043e\u0442 \u043f\u0435\u0440\u0435\u0431\u043e\u0440\u0430 \u043f\u0430\u0440\u043e\u043b\u0435\u0439 \u0438 \u0440\u0430\u0437\u0440\u0435\u0448\u0430\u044e\u0442 \u043f\u0440\u0438\u043c\u0438\u0442\u0438\u0432\u043d\u044b\u0435 \u043f\u0430\u0440\u043e\u043b\u0438, \u0430 \u0434\u043e 2021 \u0433\u043e\u0434\u0430 \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0439 \u043f\u0430\u0440\u043e\u043b\u044c \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0431\u044b\u043b \u0432\u043e\u043e\u0431\u0449\u0435 \u043f\u0443\u0441\u0442\u044b\u043c. \u0421\u0442\u043e\u0438\u0442 \u0443\u0447\u0435\u0441\u0442\u044c, \u0447\u0442\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u0430 \u043a\u0430\u043a \u0447\u0435\u0440\u0435\u0437 \u0432\u0435\u0431-\u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441, \u0442\u0430\u043a \u0438 \u0447\u0435\u0440\u0435\u0437 \u0444\u0438\u0440\u043c\u0435\u043d\u043d\u044b\u0439 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 \u043c\u0435\u043d\u0435\u0434\u0436\u043c\u0435\u043d\u0442\u0430 Winbox. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043e\u0446\u0435\u043d\u0438\u0432\u0430\u044e\u0442 \u0447\u0438\u0441\u043b\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0440\u043e\u0443\u0442\u0435\u0440\u043e\u0432 \u0432 900 000.\n\n\u0412\u044b\u0432\u043e\u0434\u044b \u0434\u043b\u044f \u0432\u043b\u0430\u0434\u0435\u043b\u044c\u0446\u0435\u0432 \u043f\u0440\u043e\u0441\u0442\u044b: \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0439\u0442\u0435 \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0438, \u0441\u043e\u0437\u0434\u0430\u0432\u0430\u0439\u0442\u0435 \u0430\u043a\u043a\u0430\u0443\u043d\u0442 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0441 \u043d\u0435\u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u043c \u0438\u043c\u0435\u043d\u0435\u043c \u0438 \u0441\u043b\u043e\u0436\u043d\u044b\u043c \u043f\u0430\u0440\u043e\u043b\u0435\u043c, \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0439 admin \u043e\u0442\u043a\u043b\u044e\u0447\u0430\u0439\u0442\u0435.\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 @\u041f2\u0422", "creation_timestamp": "2023-07-26T11:46:30.000000Z"}, {"uuid": "d56ff1d1-8605-4a2c-8e30-6f4f4d729423", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "Telegram/OD0yNlme-8efGxd5jmPzuvO9mTtKhRFaBfS7YTBiC8nHvE1e", "content": "", "creation_timestamp": "2023-07-19T19:15:21.000000Z"}, {"uuid": "6764b247-35cf-4fbe-b57f-e560bda97a91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "Telegram/RoFsdx_vYq372Swfks-cvrvAknaBTT04-fcH0qeCogBlCl2Y", "content": "", "creation_timestamp": "2025-02-19T08:07:04.000000Z"}, {"uuid": "1f6426de-cff3-47f1-b2d2-2f545e0ebe13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "published-proof-of-concept", "source": "https://t.me/road_to_oscp/244", "content": "\u0418\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 \u0434\u043b\u044f \u0430\u0442\u0430\u043a\u0438 \u043c\u0435\u0442\u043e\u0434\u043e\u043c \u043f\u0435\u0440\u0435\u0431\u043e\u0440\u0430 \u043f\u043e \u0441\u043b\u043e\u0432\u0430\u0440\u044e, \u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0439 \u043d\u0430 \u0432\u0435\u0431-\u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441 MikroTik RouterOS 6.x.\n\nhttps://github.com/j-baines/even-you-brutus\n\n\u0421\u043a\u0440\u0438\u043f\u0442, \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043a\u043e\u0442\u043e\u0440\u043e\u0433\u043e \u043c\u043e\u0436\u043d\u043e \u043f\u0435\u0440\u0435\u0447\u0438\u0441\u043b\u0438\u0442\u044c \u0432\u0430\u043b\u0438\u0434\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0432 MikroTik RouterOS, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u0443\u044e \u0441\u0445\u0435\u043c\u0443 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 Winbox. \u0414\u043b\u044f \u0435\u0433\u043e \u0440\u0430\u0431\u043e\u0442\u044b \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e, \u0447\u0442\u043e\u0431\u044b \u043f\u043e\u0440\u0442 8291 \u0431\u044b\u043b \u043e\u0442\u043a\u0440\u044b\u0442.\n\nhttps://gist.github.com/j-baines/c484fc2988123bc4626efea74c316615\n\n\u0412\u0437\u044f\u0442\u043e \u0438\u0437 \u0441\u0442\u0430\u0442\u044c\u0438: \"Exploiting MikroTik RouterOS Hardware with CVE-2023-30799\"", "creation_timestamp": "2023-07-27T15:17:40.000000Z"}, {"uuid": "6ce8df7d-37fd-40ce-8874-2fd2c1aaeb04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "published-proof-of-concept", "source": "https://t.me/sanspie_notes/343", "content": "#mikrotik #cve\n\nRemote and authenticated attackers can use the vulnerability to get a root shell on the router. (CVE-2023-30799)\n\nhttps://vulncheck.com/blog/mikrotik-foisted-revisited", "creation_timestamp": "2023-08-03T14:13:44.000000Z"}, {"uuid": "bf2bc771-a339-4e01-9153-91f13fdc2947", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "https://t.me/ctinow/126385", "content": "https://ift.tt/4DuXcQe\nMikroTik vulnerability could be used to hijack 900,000 routers (CVE-2023-30799)", "creation_timestamp": "2023-07-26T16:18:28.000000Z"}, {"uuid": "e0be31d3-ebca-499e-a032-8cc34ecab388", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "published-proof-of-concept", "source": "Telegram/J5e0ymwMuElFk6tzqcIsxZ9vMNLR3XO22TaPZ7Iucboy", "content": "", "creation_timestamp": "2023-10-24T13:30:49.000000Z"}, {"uuid": "61ae7313-ff40-4e4d-9a6b-a1446cceb2a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "Telegram/mPDS4HnOSLOxKMX1Qzp_m8dfcOJ3JdLDxYcV7g3s6jQaNg", "content": "", "creation_timestamp": "2023-07-26T08:44:24.000000Z"}, {"uuid": "ccea04b9-8162-4133-a560-06c2a944cc73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "Telegram/-Vw6YO9mtulx_zggb-I5Df5J_Tz-2D6t4AOBAu49ATGU", "content": "", "creation_timestamp": "2024-12-08T19:26:54.000000Z"}, {"uuid": "8b4f16ec-7648-47e8-9cc3-11709f9bf40a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "published-proof-of-concept", "source": "https://t.me/Shade_Black_Hacker/469", "content": "Exploiting MikroTik RouterOS Hardware with CVE-2023-30799 - Blog - VulnCheck\nhttps://vulncheck.com/blog/mikrotik-foisted-revisited", "creation_timestamp": "2023-08-05T07:42:12.000000Z"}, {"uuid": "16b2cb69-7952-4ae5-a31f-0a9873d83df8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "https://t.me/KomunitiSiber/547", "content": "Critical MikroTik RouterOS Vulnerability Exposes Over Half a Million Devices to Hacking\nhttps://thehackernews.com/2023/07/critical-mikrotik-routeros.html\n\nA severe privilege escalation issue impacting MikroTik RouterOS could be weaponized by remote malicious actors to execute arbitrary code and seize full control of vulnerable devices.\nCataloged as\u00a0CVE-2023-30799\u00a0(CVSS score: 9.1), the shortcoming is expected to put approximately 500,000 and 900,000 RouterOS systems at risk of exploitation via their web and/or Winbox interfaces, respectively,", "creation_timestamp": "2023-07-26T07:52:41.000000Z"}, {"uuid": "cd68372c-2da7-4072-a8ac-ef4ea53dd4ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "published-proof-of-concept", "source": "https://t.me/hunter4good/226", "content": "https://twitter.com/HunterMapping/status/1684141511565516800\n\ud83d\udea8Alert\ud83d\udea8 CVE-2023-30799 #MikroTik #RouterOS privilege escalation\n\ud83e\uddf7https://hunter.how/list?searchValue=product.name%3D%22MikroTik%20RouterOS%22\n\n\ud83d\udc47\ud83c\udffb Other Dorks \ud83d\udc47\ud83c\udffb\nFOFA app=\"MIKROTIK-Router\"\nShodan os:\"MikroTik RouterOS\"\n\nRefer to \ud83d\udcbb:\nhttps://thehackernews.com/2023/07/critical-mikrotik-routeros.html\n#EXP \ud83d\udd27: https://github.com/MarginResearch/FOISted\n#Infosys #infosec #informationsecurity", "creation_timestamp": "2023-07-26T12:47:24.000000Z"}, {"uuid": "4e478106-12c1-4fd7-a80b-f253aceb86f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "Telegram/kuRtP95_bwqTzj7s5jrSfYah8B2nN-WlVBQbtzHXXkRid4vWgw", "content": "", "creation_timestamp": "2025-04-09T04:24:46.000000Z"}, {"uuid": "b0605fca-e0cb-462d-9a4f-40e911953a37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "https://t.me/true_secator/4657", "content": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u0430\u0435\u0442 \u0440\u0438\u0441\u043a\u0443 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438 \u0431\u043e\u043b\u0435\u0435 900 000 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u043e\u0432 MikroTik RouterOS, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u0441\u043a\u0440\u044b\u0442\u043d\u043e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u043e\u043c.\n\n\u0421\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u043e\u0442\u0447\u0435\u0442\u0443 VulnCheck, CVE-2023-30799\u00a0\u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0441 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u0439 \u0443\u0447\u0435\u0442\u043d\u043e\u0439 \u0437\u0430\u043f\u0438\u0441\u044c\u044e \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0434\u043e \u0441\u0443\u043f\u0435\u0440-\u0430\u0434\u043c\u0438\u043d\u0430 \u0447\u0435\u0440\u0435\u0437 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441 Winbox \u0438\u043b\u0438 HTTP.\n\n\u042d\u0441\u043a\u0430\u043b\u0438\u0440\u0443\u044f \u0434\u043e \u0441\u0443\u043f\u0435\u0440\u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u043b\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 RouteOS.\n\n\u041e\u0434\u043d\u0430\u043a\u043e \u043c\u0430\u0441\u0441\u043e\u0432\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0431\u0443\u0434\u0435\u0442 \u043d\u0435 \u0442\u0430\u043a \u0442\u0440\u0438\u0432\u0438\u0430\u043b\u044c\u043d\u0430, \u0432 \u0432\u0438\u0434\u0443 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u0430\u0434\u043c\u0438\u043d\u0441\u043a\u0438\u0445 \u0443\u0447\u0435\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445, \u0447\u0442\u043e \u0432\u043f\u043e\u043b\u043d\u0435 \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u0435\u043c\u043e, \u0432\u0435\u0434\u044c Mikrotik RouterOS \u043d\u0435 \u0438\u043c\u0435\u0435\u0442 \u0437\u0430\u0449\u0438\u0442\u044b \u043e\u0442 \u0431\u0440\u0443\u0442\u0430 \u0438 \u043f\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0441 \u0434\u0435\u0444\u043e\u043b\u0442\u043d\u044b\u043c admin.\n\nCVE-2023-30799 \u0431\u044b\u043b\u0430 \u0432\u043f\u0435\u0440\u0432\u044b\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u0431\u0435\u0437 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u0430 \u0432 \u0438\u044e\u043d\u0435 2022 \u0433\u043e\u0434\u0430, \u043f\u043e\u0441\u043b\u0435 \u0447\u0435\u0433\u043e \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0432 \u043e\u043a\u0442\u044f\u0431\u0440\u0435 \u0442\u043e\u0433\u043e \u0436\u0435 \u0433\u043e\u0434\u0430 \u0432 RouterOS v6.49.7 \u0438 v6.49.8 (\u0434\u043e\u043b\u0433\u043e\u0441\u0440\u043e\u0447\u043d\u0430\u044f \u0432\u0435\u043a\u0430).\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0439 \u0441\u0442\u0430\u043b\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043e\u0441\u043b\u0435 \u0442\u043e\u0433\u043e, \u043a\u0430\u043a \u043e\u043d\u0438 VulnCheck \u043f\u043e\u0434\u0435\u043b\u0438\u043b\u0438\u0441\u044c \u043d\u043e\u0432\u044b\u043c\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430\u043c\u0438, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u043c\u0438 \u043d\u0430 MikroTik.\n\n\u0417\u0430 \u043e\u0441\u043d\u043e\u0432\u0443 \u0431\u044b\u043b \u0432\u0437\u044f\u0442 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 FOISted RouterOS \u043e\u0442 Margin Research.\n\n\u041d\u043e\u0432\u044b\u0439 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u043e\u0442 VulnCheck \u043e\u0431\u0445\u043e\u0434\u0438\u0442 \u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0430 FTP, \u0438 \u043d\u0430 \u043d\u0435\u0433\u043e \u043d\u0435 \u0432\u043b\u0438\u044f\u0435\u0442 \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0430 \u0438\u043b\u0438 \u0444\u0438\u043b\u044c\u0442\u0440\u0430\u0446\u0438\u044f \u0431\u0438\u043d\u0434\u0448\u0435\u043b\u043b\u043e\u0432, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u043e\u043d \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0432\u0435\u0431-\u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441 RouterOS \u0434\u043b\u044f \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0444\u0430\u0439\u043b\u043e\u0432.\n\n\u041f\u043e \u0438\u0442\u043e\u0433\u0443 \u0432\u0441\u0435\u0445 \u043f\u0440\u0435\u043e\u0431\u0440\u0430\u0437\u043e\u0432\u0430\u043d\u0438\u0439 \u0441 ROP \u0438 \u0432\u044b\u0437\u043e\u0432\u043e\u043c dlopen, \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u043b \u0448\u0438\u0440\u043e\u043a\u0443\u044e \u043f\u0440\u0438\u043c\u0435\u043d\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u043b\u044f \u0432 \u0440\u0430\u0437\u043d\u044b\u0445 \u0432\u0435\u0440\u0441\u0438\u0439 OS.\n\n\u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f, \u0447\u0442\u043e Shodan \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0432\u0430\u0435\u0442 \u0431\u043e\u043b\u0435\u0435 474 000 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 (\u0430 \u0435\u0441\u043b\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0447\u0435\u0440\u0435\u0437 Winbox - \u043e\u043a\u043e\u043b\u043e 926 000), \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 VulnCheck \u0440\u0435\u0448\u0438\u043b\u0438 \u043d\u0435 \u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u0442\u044c PoC, \u043f\u043e\u043b\u0430\u0433\u0430\u044f \u043f\u0440\u043e\u0441\u0442\u043e\u0442\u0443 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0438 \u0432\u044b\u0441\u043e\u043a\u0438\u0435 \u0440\u0438\u0441\u043a\u0438 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a.\n\n\u0412\u0435\u0434\u044c \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 MikroTik \u043c\u043d\u043e\u0433\u043e \u0440\u0430\u0437 \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u0430\u043b\u0438\u0441\u044c \u0430\u0442\u0430\u043a\u0430\u043c \u0438 \u043d\u0435\u043f\u0440\u0435\u0434\u043d\u0430\u043c\u0435\u0440\u0435\u043d\u043d\u043e \u0441\u043f\u043e\u0441\u043e\u0431\u0441\u0442\u0432\u043e\u0432\u0430\u043b\u0438 \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044e \u0432\u043d\u0443\u0448\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 DDoS-\u0431\u043e\u0442\u043d\u0435\u0442\u043e\u0432, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0442\u0430\u043a\u043e\u0439 \u043a\u0430\u043a M\u0113ris.\n\n\u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u043d\u0435\u043c\u0435\u0434\u043b\u0435\u043d\u043d\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f RouterOS, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u0447\u0438\u0441\u043b\u043e \u043f\u043e\u043f\u044b\u0442\u043e\u043a \u0430\u0442\u0430\u043a, \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0432 \u0431\u043b\u0438\u0436\u0430\u0439\u0448\u0435\u0435 \u0432\u0440\u0435\u043c\u044f \u0432\u043e\u0437\u0440\u0430\u0441\u0442\u0435\u0442.\n\n\u0412 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u043e \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u044e \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u0439 \u0440\u0435\u0441\u0435\u0440\u0447\u0435\u0440\u044b \u043f\u0440\u0435\u0434\u043b\u0430\u0433\u0430\u044e\u0442 \u0443\u0434\u0430\u043b\u044f\u0442\u044c \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0435 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u044b \u0438\u0437 \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0430, \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0438\u0432\u0430\u0442\u044c IP-\u0430\u0434\u0440\u0435\u0441\u0430 \u0434\u043b\u044f \u0432\u0445\u043e\u0434\u0430 \u0441\u043f\u0438\u0441\u043a\u043e\u043c \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0438\u0439, \u043e\u0442\u043a\u043b\u044e\u0447\u0430\u0442\u044c Winbox \u0432 \u043f\u043e\u043b\u044c\u0437\u0443 SSH.", "creation_timestamp": "2023-07-26T11:07:06.000000Z"}, {"uuid": "fc06e2fd-0211-43eb-b12f-f3308fc282c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "https://t.me/cibsecurity/67006", "content": "\u203c CVE-2023-30799 \u203c\n\nMikroTik RouterOS stable before 6.49.7 and long-term through 6.48.6 are vulnerable to a privilege escalation issue. A remote and authenticated attacker can escalate privileges from admin to super-admin on the Winbox or HTTP interface. The attacker can abuse this vulnerability to execute arbitrary code on the system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-19T18:21:48.000000Z"}, {"uuid": "bea0028f-8a37-447b-8fa9-9dbe724ada48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "https://t.me/thehackernews/3647", "content": "\ud83d\udea8 Heads up, network admins! \n \nMikroTik RouterOS vulnerability (CVE-2023-30799) exposes 500,000+ systems to potential exploitation!   \n \nRead: https://thehackernews.com/2023/07/critical-mikrotik-routeros.html \n \nUpgrade to RouterOS 6.49.8 or 7.x ASAP!", "creation_timestamp": "2023-07-26T07:06:26.000000Z"}, {"uuid": "66587b5d-ae4d-4754-aa98-6cc4f2436b4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "Telegram/R3dmg75m21qRaKQfqNH2xrWXCFHtj6HG2HSZ-XRnjPpnmv0", "content": "", "creation_timestamp": "2023-07-20T01:14:05.000000Z"}, {"uuid": "c182ba9d-0cf6-4a9a-93a3-a6cc7da03d2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/7571", "content": "Exploiting MikroTik RouterOS Hardware with CVE-2023-30799\n\nhttps://vulncheck.com/blog/mikrotik-foisted-revisited", "creation_timestamp": "2023-07-25T20:27:23.000000Z"}, {"uuid": "336e2cac-e25f-43dd-900d-3765f6ce1fb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8735", "content": "#Hardware_Security\n1. Zenbleed - vulnerability of AMD Zen2 processors (CVE-2023-20593)\nhttps://lock.cmpxchg8b.com/zenbleed.html\n2. Exploiting MikroTik RouterOS Hardware with CVE-2023-30799\nhttps://vulncheck.com/blog/mikrotik-foisted-revisited", "creation_timestamp": "2023-07-26T11:00:30.000000Z"}, {"uuid": "bf6f52cd-7a12-482a-ad6c-d605b88d4298", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "published-proof-of-concept", "source": "Telegram/EIFxJITUDV8gcMx7pqF7TgzjgxOMYFmvaCKm6RSR5pXseFs", "content": "", "creation_timestamp": "2023-07-26T11:38:46.000000Z"}, {"uuid": "836543a8-790f-490d-b8c5-100032102597", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "https://t.me/secmedia/1266", "content": "\u0420\u043e\u0443\u0442\u0435\u0440\u044b \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0441\u0442\u0432\u0430 MikroTik \u043d\u0430\u0445\u043e\u0434\u044f\u0442\u0441\u044f \u043f\u043e\u0434 \u0443\u0433\u0440\u043e\u0437\u043e\u0439 \u0438\u0437-\u0437\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0441 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u043e\u043c CVE-2023-30799 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0434\u043e \u0443\u0440\u043e\u0432\u043d\u044f \u0442\u0430\u043a \u043d\u0430\u0437\u044b\u0432\u0430\u0435\u043c\u043e\u0433\u043e \u00ab\u0441\u0443\u043f\u0435\u0440\u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430\u00bb, \u0442\u043e \u0435\u0441\u0442\u044c \u0444\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u043e\u043c.", "creation_timestamp": "2023-07-27T09:20:03.000000Z"}]}