First published: Wed Mar 16 2022(Updated: )
In the SCEP Server of RouterOS in certain Mikrotik products, an attacker can trigger a heap-based buffer overflow that leads to remote code execution. The attacker must know the scep_server_name value. This affects RouterOS 6.46.8, 6.47.9, and 6.47.10.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MikroTik RouterOS | =6.46.8 | |
MikroTik RouterOS | =6.47.9 | |
MikroTik RouterOS | =6.47.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41987 is a vulnerability in the SCEP Server of RouterOS in certain MikroTik products that allows an attacker to trigger a heap-based buffer overflow and execute remote code.
The severity of CVE-2021-41987 is classified as high with a CVSS score of 8.1.
CVE-2021-41987 affects certain versions of MikroTik RouterOS including 6.46.8, 6.47.9, and 6.47.10.
To exploit CVE-2021-41987, the attacker must know the scep_server_name value and can then trigger a heap-based buffer overflow to execute remote code.
To mitigate CVE-2021-41987, it is recommended to update RouterOS to versions that have fixed the vulnerability as provided by MikroTik.