Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2025-42611
Received
More InfoOfficial Page
Source-a6d3dc9e-0591-4a13-bce7-0f5b31ff6158
View Known Exploited Vulnerability (KEV) details
Published At-05 May, 2026 | 11:16
Updated At-05 May, 2026 | 11:16

RouterOS provides various services that rely on correct verification of client and server certificates to secure confidentiality and integrity of communications. This includes OpenVPN, CAPsMAN, Dot1x (802.1X), among others. The vulnerability lies in shared certificate validation logic which uses the system certificate store that is shared and equally trusted by all system services. This causes confusion of scope, allowing any certificate authority present in the system-wide trust store to be trusted in any context (with some exceptions), allowing partial or full authentication bypass in CAPsMAN, OpenVPN, Dot1X and potentially others.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Type: Secondary
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-295Secondarya6d3dc9e-0591-4a13-bce7-0f5b31ff6158
CWE ID: CWE-295
Type: Secondary
Source: a6d3dc9e-0591-4a13-bce7-0f5b31ff6158
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.cert.si/en/cve-2025-42611/a6d3dc9e-0591-4a13-bce7-0f5b31ff6158
N/A
Hyperlink: https://www.cert.si/en/cve-2025-42611/
Source: a6d3dc9e-0591-4a13-bce7-0f5b31ff6158
Resource: N/A
Change History
0Changes found

Details not found