Impact
A vulnerability exists in MikroTik RouterOS 6.49.8’s SCEP Endpoint where manipulation of the transactionID or messageType parameters to the ASN1_STRING_data function can trigger an out‑of‑bounds read. This flaw allows the system to read memory beyond the intended buffer boundaries. The description does not mention writable memory being affected, so the vulnerability is an overread rather than a read‑write misuse. The read may reveal data stored adjacent to the buffer, which could include sensitive configuration or system information. Based on the description, it is inferred that this could lead to disclosure of internal data, though the exact contents are not specified.
Affected Systems
The affected product is MikroTik RouterOS, specifically version 6.49.8. The advisory does not list other affected releases, so the flaw appears limited to this edition.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity. No EPSS data is available, and the vulnerability is not listed in CISA’s KEV catalog. The SCEP service is reachable over the network, enabling a remote attacker to supply crafted parameters and trigger the overread. Publicly available exploits raise the likelihood of exploitation even though broader usage data is missing. Consequently, the risk is moderate, and patching should be prioritized, particularly if the SCEP service is exposed to external networks.
OpenCVE Enrichment