{"vulnerability": "CVE-2024-54772", "sightings": [{"uuid": "86439aca-5a52-404a-9249-3ba15b842dd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54772", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4155", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-54772\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-11T23:15:09.117\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://github.com/deauther890/CVE-2024-54772", "creation_timestamp": "2025-02-12T23:09:46.000000Z"}, {"uuid": "3e0a7bb8-473d-4dca-a1c4-3fd6c0565490", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54772", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhx4mjgwxy2u", "content": "", "creation_timestamp": "2025-02-12T02:24:50.625724Z"}, {"uuid": "c248fad0-7735-4ba1-a7df-5ac0c16fa265", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54772", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113987594190368083", "content": "", "creation_timestamp": "2025-02-11T22:24:15.991138Z"}, {"uuid": "1eb296e3-e921-42c4-b821-ca2da4d5c192", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54772", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhws2pq37d2x", "content": "", "creation_timestamp": "2025-02-11T23:15:49.422546Z"}, {"uuid": "7f67530b-bcdb-45fa-95e4-875c1852e195", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54772", "type": "seen", "source": "https://t.me/mikrotik_rus/352", "content": "\ud83d\udd25 \u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0435 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0435 MikroTik: CVE-2024-54772.\n\n\u041d\u0438\u0436\u0435 \u043f\u0440\u0438\u0432\u0435\u0434\u0435\u043d\u0430 \u0441\u0441\u044b\u043b\u043a\u0430 \u043d\u0430 CVE MikroTik \u043f\u043e \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u044e \u043d\u0430 18 \u0444\u0435\u0432\u0440\u0430\u043b\u044f 2025 \u0433\u043e\u0434\u0430.\n\n\u0417\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438: \u0432\u0435\u0440\u0441\u0438\u0438 RouterOS \u0434\u043e 6.49.18 \u0438 7.18.\n\n\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c\u044b\u0435 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f: \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c RouterOS \u2013 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0434\u043e 6.49.18, 7.18\n\n\u0414\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u044f \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u0439.\n\nhttps://mikrotik.com/supportsec/cve-2024-54772", "creation_timestamp": "2025-02-25T10:34:04.000000Z"}, {"uuid": "824aeab5-f577-435a-b67b-415a90934a1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54772", "type": "seen", "source": "https://t.me/cvedetector/17774", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54772 - MikroTik RouterOS Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-54772 \nPublished : Feb. 11, 2025, 11:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : An issue was discovered in the Winbox service of MikroTik RouterOS v6.43 through v7.16.1. A discrepancy in response times between connection attempts made with a valid username and those with an invalid username allows attackers to enumerate for valid accounts. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T01:46:07.000000Z"}, {"uuid": "c809eefb-b6b1-4751-9b8e-7de411fc35f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54772", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3960", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-54772\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in the Winbox service of MikroTik RouterOS v6.43 through v7.16.1. A discrepancy in response times between connection attempts made with a valid username and those with an invalid username allows attackers to enumerate for valid accounts.\n\ud83d\udccf Published: 2025-02-12T00:32:17Z\n\ud83d\udccf Modified: 2025-02-12T00:32:17Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-54772\n2. https://github.com/deauther890/CVE-2024-54772", "creation_timestamp": "2025-02-12T01:09:58.000000Z"}, {"uuid": "34446af7-2040-496f-9e97-05036ff3657e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54772", "type": "seen", "source": "https://t.me/mtikpro/352", "content": "\u0412\u044b\u0448\u043b\u0430 \u043d\u043e\u0432\u0430\u044f \u0432\u0435\u0440\u0441\u0438\u044f Nmap 7.96.\n\n\u0412\u043e \u0432\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u044b\u0435 \u0441\u043a\u0440\u0438\u043f\u0442\u044b (NSE) \u0434\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u044b:\n-- targets-ipv6-eui64 -- \u0433\u0435\u043d\u0435\u0440\u0430\u0446\u0438\u044f IPv6-\u0430\u0434\u0440\u0435\u0441\u043e\u0432 \u0438\u0437 MAC-\u0430\u0434\u0440\u0435\u0441\u043e\u0432 \u043f\u043e EUI-64\n-- mikrotik-routeros-version \u2014 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 MikroTik \u0447\u0435\u0440\u0435\u0437 WinBox\n-- mikrotik-routeros-username-brute \u2014 \u043f\u0435\u0440\u0435\u0431\u043e\u0440 \u0438\u043c\u0451\u043d \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u043d\u0430 MikroTik \u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e CVE-2024-54772", "creation_timestamp": "2025-05-12T05:27:51.000000Z"}, {"uuid": "bedc4e01-39c4-448d-ab9f-d53ede2b6cfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54772", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5170", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-54772\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in the Winbox service of MikroTik RouterOS long-term release v6.43.13 through v6.49.13 and stable v6.43 through v7.17.2. A patch is available in the stable release v6.49.18. A discrepancy in response size between connection attempts made with a valid username and those with an invalid username allows attackers to enumerate for valid accounts.\n\ud83d\udccf Published: 2025-02-11T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-24T15:32:18.010Z\n\ud83d\udd17 References:\n1. https://github.com/deauther890/CVE-2024-54772", "creation_timestamp": "2025-02-24T16:24:56.000000Z"}, {"uuid": "7d47f04f-e5d4-4ba9-adf1-0a525a03bff9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54772", "type": "seen", "source": "https://t.me/mtikpro/348", "content": "\u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0435 \u0432\u0440\u0435\u043c\u044f \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043a\u0443\u0447\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432.\n\n\u0421\u0443\u0442\u044c - \u043f\u0440\u043e\u0431\u0443\u0435\u043c \u043f\u0435\u0440\u0435\u0431\u0438\u0440\u0430\u0442\u044c \u0440\u0430\u0437\u043d\u044b\u0435 \u043b\u043e\u0433\u0438\u043d/\u043f\u0430\u0440\u043e\u043b\u0438 \u043f\u0440\u0438 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438, \u0430\u043d\u0430\u043b\u0438\u0437\u0438\u0440\u0443\u0435\u043c \u0432\u0440\u0435\u043c\u044f \u043e\u0442\u0432\u0435\u0442\u0430 \u0438 \u043f\u043e\u043b\u0443\u0447\u0430\u0435\u043c \u0441\u043f\u0438\u0441\u043e\u043a \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0442 \u043d\u0430 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u043c \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0435 (allows attackers to enumerate for valid accounts).\n\n\u0422\u043e \u0435\u0441\u0442\u044c \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u0441\u0442\u0443\u0447\u0430\u0442\u044c\u0441\u044f \u043d\u0430 \u0436\u0435\u043b\u0435\u0437\u043a\u0443 \u0438 \u043f\u043e\u043f\u044b\u0442\u0430\u0442\u044c\u0441\u044f \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0441\u043b\u0443\u0447\u0430\u0439\u043d\u044b\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c \u0438 \u043f\u0430\u0440\u043e\u043b\u0435\u043c.\n\n\u0415\u0441\u043b\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0436\u0435\u043b\u0435\u0437\u043a\u0430 \u0431\u0443\u0434\u0435\u0442 \u043e\u0442\u0432\u0435\u0447\u0430\u0442\u044c \u0434\u043e\u043b\u044c\u0448\u0435, \u0447\u0435\u043c \u043f\u0440\u0438 \u043f\u043e\u043f\u044b\u0442\u043a\u0435 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u043d\u0435 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c.\n\n\n\u0422\u0430\u043a\u0430\u044f \u0436\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043d\u0435\u0434\u0430\u0432\u043d\u043e \u0438 \u0431\u044b\u043b\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0430 \u0432 #MikroTik #RouterOS\n\nCVE-2024-54772\n\n\u041e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043d\u0430 \u0441\u0430\u0439\u0442\u0435 \u0432\u0435\u043d\u0434\u043e\u0440\u0430: https://mikrotik.com/supportsec/cve-2024-54772\n\n\u2014\u2014\n\u0423\u0436\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043e \u0432 RouterOS 6.49.18 \u0438 7.18", "creation_timestamp": "2025-02-27T10:36:16.000000Z"}, {"uuid": "a3711fbe-30fb-4d75-8e6e-074396a8df58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54772", "type": "seen", "source": "Telegram/hO8nY5_yXUnx0G2-B1mNC9J0BJoBkfhIvJZbf2R3C3li2uuf", "content": "", "creation_timestamp": "2025-02-13T10:28:52.000000Z"}, {"uuid": "c8ab335e-ead6-46f9-abde-45f13b1b4311", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54772", "type": "seen", "source": "Telegram/T7op6P7G55P-LSD-aB7Vv40hIAUSrHDIGBr4GcVyNc_VhepB", "content": "", "creation_timestamp": "2025-02-25T10:52:41.000000Z"}, {"uuid": "d2c8fff7-8e4e-499a-92e9-60cdbd1b3eec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54772", "type": "published-proof-of-concept", "source": "Telegram/GLNGAp7-4r9Fw5qDTXN2bUbXQdnuxUMfCfnz3tT-FZBf56E", "content": "", "creation_timestamp": "2025-02-09T12:00:09.000000Z"}, {"uuid": "24ac15cd-d2cc-439d-b825-4d7e8b74f810", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54772", "type": "seen", "source": "Telegram/6bEKnmdgOnu7jziXm2JnPvOCY74SD2q2fMw7oeVtit5uXAA8", "content": "", "creation_timestamp": "2025-02-14T10:06:01.000000Z"}, {"uuid": "eaaeaefd-988b-42c9-b3f1-0b474351192f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54772", "type": "published-proof-of-concept", "source": "Telegram/60nSYfr8YgV4Qw2XZjsLnq8iTa5oL39wg5v60B1tauxHDrc", "content": "", "creation_timestamp": "2025-02-08T04:00:07.000000Z"}, {"uuid": "8aa07221-f6b5-4145-a38f-23e3138e7927", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54772", "type": "published-proof-of-concept", "source": "Telegram/lzavWPyT9wIdQmFwqwWQxxPnKUs6ZiFwAyAy7SZQkm8uYfY", "content": "", "creation_timestamp": "2025-02-13T16:12:46.000000Z"}]}