MikroTik RouterOS SCEP Endpoint Out-of-Bounds Read Vulnerability (CVE-2026-7668)
MikroTik RouterOS 6.49.8 is vulnerable to an out-of-bounds read in the SCEP endpoint component, triggered by remote manipulation of the transactionID/messageType argument, potentially leading to denial of service or information disclosure.
CVE-2026-7668 is an out-of-bounds read vulnerability affecting MikroTik RouterOS version 6.49.8. The vulnerability exists within the SCEP (Simple Certificate Enrollment Protocol) endpoint, specifically in the ASN1_STRING_data function located in the nova/lib/www/scep.p library. A remote attacker can exploit this vulnerability by manipulating the transactionID or messageType arguments. Publicly available exploits exist, increasing the risk of exploitation. The vendor has been notified but has not provided a response. Exploitation could lead to denial of service or information disclosure.
Attack Chain
- Attacker identifies a MikroTik RouterOS device running version 6.49.8 with an exposed SCEP endpoint.
- The attacker crafts a malicious SCEP request containing a specially crafted
transactionIDormessageTypeargument. - The attacker sends the malicious SCEP request to the RouterOS device’s SCEP endpoint.
- The
ASN1_STRING_datafunction processes the request and attempts to access memory outside the allocated buffer due to the manipulated argument. - The out-of-bounds read occurs, potentially leading to a crash of the SCEP process or the disclosure of sensitive information from adjacent memory regions.
- If the attacker can reliably trigger a crash, they can cause a denial of service.
- If sensitive information is disclosed, the attacker might use this to further compromise the device or network.
Impact
Successful exploitation of CVE-2026-7668 can lead to a denial of service condition on the affected MikroTik RouterOS device. An attacker could potentially cause the device to become unresponsive, disrupting network services. Furthermore, the out-of-bounds read could expose sensitive information stored in memory, which an attacker could use to further compromise the device or network. Since an exploit is publicly available, the risk of widespread exploitation is elevated.
Recommendation
- Monitor network traffic for SCEP requests with unusually long or malformed
transactionIDormessageTypeparameters. Use the network connection rule below. - Implement rate limiting on the SCEP endpoint to mitigate potential denial-of-service attacks.
- While no patch is available, consider disabling the SCEP endpoint if it is not required.
Detection coverage 2
Detect Malformed SCEP Requests via Network Traffic
mediumDetects network connections with unusual SCEP requests, potentially indicating exploitation attempts against CVE-2026-7668.
Detect Abnormal Process Executions Related to SCEP Endpoint
lowDetects potential exploitation of CVE-2026-7668 by monitoring for unusual process executions originating from or related to the SCEP endpoint.
Detection queries are kept inside the platform. Get full rules →