CVE-2025-42611
Received Received - Intake
Certificate Authority Spoofing in RouterOS Services

Publication date: 2026-05-05

Last updated on: 2026-05-05

Assigner: ENISA

Description
RouterOS provides various services that rely on correct verification of client and server certificates to secure confidentiality and integrity of communications. This includes OpenVPN, CAPsMAN, Dot1x (802.1X), among others. The vulnerability lies in shared certificate validation logic which uses the system certificate store that is shared and equally trusted by all system services. This causes confusion of scope, allowing any certificate authority present in the system-wide trust store to be trusted in any context (with some exceptions), allowing partial or full authentication bypass in CAPsMAN, OpenVPN, Dot1X and potentially others.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-05
Last Modified
2026-05-05
Generated
2026-05-07
AI Q&A
2026-05-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
mikrotik routeros 7.20
mikrotik routeros From 7.21 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-295 The product does not validate, or incorrectly validates, a certificate.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

This vulnerability can allow an attacker to bypass authentication mechanisms in RouterOS services such as CAPsMAN, OpenVPN, and Dot1X.

An attacker could use a valid certificate from a trusted CA to impersonate legitimate services or clients, potentially gaining unauthorized access to wireless configurations, network switches, or VPN servers.

This unauthorized access could compromise the confidentiality and integrity of your network communications and configurations.


Can you explain this vulnerability to me?

CVE-2025-42611 is an authentication bypass vulnerability in multiple RouterOS services caused by improper certificate validation.

RouterOS uses a shared system-wide certificate store trusted by all its services, which causes confusion of scope. This means any certificate authority (CA) present in the shared trust store can validate certificates across different services, even if not intended.

As a result, an attacker with a valid X.509 certificate signed by a trusted CA (such as Let's Encrypt) can impersonate services or clients in services like CAPsMAN, OpenVPN, and Dot1X, leading to partial or full authentication bypass.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves reviewing the certificate trust configuration on your RouterOS system to identify if the shared system-wide certificate store is being used improperly across services like CAPsMAN, OpenVPN, and Dot1X.

Specifically, you should check for certificates imported from public certificate authorities (e.g., Let’s Encrypt) that are trusted system-wide, which could allow authentication bypass.

While no explicit commands are provided in the resources, typical RouterOS commands to review certificates and trust stores include:

  • /certificate print
  • /certificate export-certificate
  • /interface ovpn-server print
  • /caps-man print

These commands help you list certificates, check which are trusted, and review service configurations that rely on certificate validation. By analyzing these outputs, you can detect if the system-wide trust store is used in a way that could be exploited.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading your RouterOS installation to version 7.21 or later, where this vulnerability is addressed.

Additionally, you should manually review all imported certificates and adjust the trust-store settings to restrict certificate authority trust scopes, preventing any CA from being trusted across all services indiscriminately.

This involves removing or limiting certificates from public CAs that are trusted system-wide and implementing proper certificate pinning or scoped trust to ensure that certificates are only trusted in their intended context.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows partial or full authentication bypass in critical RouterOS services such as CAPsMAN, OpenVPN, and Dot1X by exploiting improper certificate validation due to a shared certificate store.

Such authentication bypass can lead to unauthorized access to network configurations, VPN servers, and wireless management, potentially exposing sensitive data or disrupting secure communications.

Consequently, this undermines the confidentiality and integrity of communications, which are key requirements in compliance frameworks like GDPR and HIPAA that mandate protection of personal and sensitive information.

Failure to properly secure authentication mechanisms and prevent unauthorized access could result in non-compliance with these regulations, leading to legal and financial repercussions.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart