PatchSiren cyber security CVE debrief
CVE-2018-14847 MikroTik CVE debrief
CVE-2018-14847 is a MikroTik RouterOS directory traversal vulnerability that CISA has included in the Known Exploited Vulnerabilities catalog. The KEV listing is the key defensive signal here: it indicates known exploitation and directs defenders to apply vendor updates without delay.
- Vendor
- MikroTik
- Product
- RouterOS
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2021-12-01
- Original CVE updated
- 2021-12-01
- Advisory published
- 2021-12-01
- Advisory updated
- 2021-12-01
Who should care
Administrators and security teams responsible for MikroTik RouterOS deployments, especially those tracking or remediating CISA KEV-listed vulnerabilities.
Technical summary
The official source corpus identifies CVE-2018-14847 as a directory traversal issue in MikroTik RouterOS. CISA’s KEV entry marks it as a known exploited vulnerability and recommends applying updates per vendor instructions. The supplied sources do not include a vendor advisory or fixed-version details.
Defensive priority
High — CISA KEV inclusion means this vulnerability should be prioritized for prompt remediation and asset verification.
Recommended defensive actions
- Inventory MikroTik RouterOS systems across the environment.
- Check the CISA KEV entry and follow vendor update instructions for CVE-2018-14847.
- Apply RouterOS updates as soon as practical.
- If immediate patching is not possible, restrict access to the affected systems until remediation is complete.
- Reconfirm remediation after updates are applied.
Evidence notes
CISA’s Known Exploited Vulnerabilities feed lists CVE-2018-14847 as a MikroTik RouterOS directory traversal vulnerability, added on 2021-12-01 with a due date of 2022-06-01 and the required action “Apply updates per vendor instructions.” The official CVE and NVD records are provided as reference links in the source corpus.
Official resources
-
CVE-2018-14847 CVE record
CVE.org
-
CVE-2018-14847 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply updates per vendor instructions.
-
Source item URL
cisa_kev
This debrief is limited to the supplied official sources and CISA KEV metadata. It intentionally avoids unsupported details such as affected versions, exploit mechanics, or vendor-specific remediation steps not present in the source corpus.