Description

RouterOS provides various services that rely on correct verification of client and server certificates to secure confidentiality and integrity of communications. This includes OpenVPN, CAPsMAN, Dot1x (802.1X), among others. The vulnerability lies in shared certificate validation logic which uses the system certificate store that is shared and equally trusted by all system services. This causes confusion of scope, allowing any certificate authority present in the system-wide trust store to be trusted in any context (with some exceptions), allowing partial or full authentication bypass in CAPsMAN, OpenVPN, Dot1X and potentially others.

INFO

Published Date :

2026-05-05T10:58:36.937Z

Last Modified :

2026-05-05T12:49:47.495Z

Source :

ENISA
AFFECTED PRODUCTS

The following products are affected by CVE-2025-42611 vulnerability.

Vendors Products
Mikrotik
  • Routeros
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-42611.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact