Skip to content
CVSS 7.3 · HIGH

CVE-2026-7668

A vulnerability was identified in MikroTik RouterOS 6.49.8. This vulnerability affects the function ASN1_STRING_data in the library nova/lib/www/scep.p of the component SCEP Endpoint. The manipulation of the argument transactionID/messageType leads to out-of-bounds read. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

View on NVD

Analysis

MikroTik is ubiquitous in Mexican and Latin American network infrastructure. This is a high-severity remote vulnerability with a publicly available exploit and no current vendor response or patch, making it a high-risk scenario for admins.

Severity

Score: 7.3(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: LOW
I: LOW
A: LOW
Weakness (CWE): CWE-119CWE-125

EPSS

Probability of exploitation (next 30 days): 0.0004 (0.0%)
Percentile: 11.5%
EPSS: 2026-05-06

Technical description

A vulnerability was identified in MikroTik RouterOS 6.49.8. This vulnerability affects the function ASN1_STRING_data in the library nova/lib/www/scep.p of the component SCEP Endpoint. The manipulation of the argument transactionID/messageType leads to out-of-bounds read. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Published: 5/2/2026, 9:16:07 PM
Last modified: 5/5/2026, 7:15:34 PM

References

HomeEventsBlogResourcesTeam