CVE-2025-42611
Certificate Authority Spoofing in RouterOS Services
Publication date: 2026-05-05
Last updated on: 2026-05-05
Assigner: ENISA
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mikrotik | routeros | 7.20 |
| mikrotik | routeros | From 7.21 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-295 | The product does not validate, or incorrectly validates, a certificate. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability can allow an attacker to bypass authentication mechanisms in RouterOS services such as CAPsMAN, OpenVPN, and Dot1X.
An attacker could use a valid certificate from a trusted CA to impersonate legitimate services or clients, potentially gaining unauthorized access to wireless configurations, network switches, or VPN servers.
This unauthorized access could compromise the confidentiality and integrity of your network communications and configurations.
Can you explain this vulnerability to me?
CVE-2025-42611 is an authentication bypass vulnerability in multiple RouterOS services caused by improper certificate validation.
RouterOS uses a shared system-wide certificate store trusted by all its services, which causes confusion of scope. This means any certificate authority (CA) present in the shared trust store can validate certificates across different services, even if not intended.
As a result, an attacker with a valid X.509 certificate signed by a trusted CA (such as Let's Encrypt) can impersonate services or clients in services like CAPsMAN, OpenVPN, and Dot1X, leading to partial or full authentication bypass.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this vulnerability involves reviewing the certificate trust configuration on your RouterOS system to identify if the shared system-wide certificate store is being used improperly across services like CAPsMAN, OpenVPN, and Dot1X.
Specifically, you should check for certificates imported from public certificate authorities (e.g., Letβs Encrypt) that are trusted system-wide, which could allow authentication bypass.
While no explicit commands are provided in the resources, typical RouterOS commands to review certificates and trust stores include:
- /certificate print
- /certificate export-certificate
- /interface ovpn-server print
- /caps-man print
These commands help you list certificates, check which are trusted, and review service configurations that rely on certificate validation. By analyzing these outputs, you can detect if the system-wide trust store is used in a way that could be exploited.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include upgrading your RouterOS installation to version 7.21 or later, where this vulnerability is addressed.
Additionally, you should manually review all imported certificates and adjust the trust-store settings to restrict certificate authority trust scopes, preventing any CA from being trusted across all services indiscriminately.
This involves removing or limiting certificates from public CAs that are trusted system-wide and implementing proper certificate pinning or scoped trust to ensure that certificates are only trusted in their intended context.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows partial or full authentication bypass in critical RouterOS services such as CAPsMAN, OpenVPN, and Dot1X by exploiting improper certificate validation due to a shared certificate store.
Such authentication bypass can lead to unauthorized access to network configurations, VPN servers, and wireless management, potentially exposing sensitive data or disrupting secure communications.
Consequently, this undermines the confidentiality and integrity of communications, which are key requirements in compliance frameworks like GDPR and HIPAA that mandate protection of personal and sensitive information.
Failure to properly secure authentication mechanisms and prevent unauthorized access could result in non-compliance with these regulations, leading to legal and financial repercussions.