๐Ÿ” CVE Alert

CVE-2025-42611

MEDIUM 6.5

Improper certificate validation in multiple RouterOS services

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th

RouterOS provides various services that rely on correct verification of client and server certificates to secure confidentiality and integrity of communications. This includes OpenVPN, CAPsMAN, Dot1x (802.1X), among others. The vulnerability lies in shared certificate validation logic which uses the system certificate store that is shared and equally trusted by all system services. This causes confusion of scope, allowing any certificate authority present in the system-wide trust store to be trusted in any context (with some exceptions), allowing partial or full authentication bypass in CAPsMAN, OpenVPN, Dot1X and potentially others.

CWE CWE-295
Vendor mikrotik
Product routeros
Published May 5, 2026
Last Updated May 5, 2026
Stay Ahead of the Next One

Get instant alerts for mikrotik routeros

Be the first to know when new medium vulnerabilities affecting mikrotik routeros are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None

Affected Versions

Mikrotik / RouterOS
0 โ‰ค 7.20.x

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
cert.si: https://www.cert.si/en/cve-2025-42611/