CVE-2025-42611 PUBLISHED

Improper certificate validation in multiple RouterOS services

Assigner: ENISA
Reserved: 16.04.2025 Published: 05.05.2026 Updated: 05.05.2026

RouterOS provides various services that rely on correct verification of client and server certificates to secure confidentiality and integrity of communications. This includes OpenVPN, CAPsMAN, Dot1x (802.1X), among others.

The vulnerability lies in shared certificate validation logic which uses the system certificate store that is shared and equally trusted by all system services. This causes confusion of scope, allowing any certificate authority present in the system-wide trust store to be trusted in any context (with some exceptions), allowing partial or full authentication bypass in CAPsMAN, OpenVPN, Dot1X and potentially others.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CVSS Score: 6.5

Product Status

Vendor Mikrotik
Product RouterOS
Versions Default: unaffected
  • affected from 0 to 7.20.x (incl.)

References

Problem Types

  • CWE-295 Improper certificate validation CWE

Impacts

  • CAPEC-115 Authentication Bypass