MikroTik RouterOS 6.49.8 SCEP Endpoint Vulnerability (CVE-2026-7668)
The National Vulnerability Database has disclosed CVE-2026-7668, a high-severity (CVSS 7.3) out-of-bounds read vulnerability impacting MikroTik RouterOS 6.49.8. Specifically, the flaw resides in the ASN1_STRING_data function within the SCEP Endpoint component, located in nova/lib/www/scep.p.
Attackers can trigger this vulnerability remotely by manipulating the transactionID or messageType arguments. The critical concern here is that an exploit for this flaw is already publicly available, significantly lowering the bar for attackers. MikroTik reportedly did not respond to early disclosure attempts, leaving defenders in a precarious position.
This vulnerability presents a clear and present danger to organizations using affected MikroTik devices. An out-of-bounds read can lead to information disclosure or, in some cases, remote code execution, giving attackers a foothold into network infrastructure. The public exploit availability means active exploitation is highly probable, demanding immediate attention from network administrators.
What This Means For You
- If your organization uses MikroTik RouterOS 6.49.8, you are directly exposed. This isn't theoretical; a public exploit exists. You need to immediately identify all MikroTik devices running this specific version, isolate them, and monitor for any vendor-issued patches or workarounds. Prioritize this vulnerability as if it were actively exploited on your network, because it very well could be.
Related ATT&CK Techniques
🛡️ Detection Rules
1 rule · 6 SIEM formats1 detection rule auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
MikroTik RouterOS SCEP Endpoint Out-of-Bounds Read - CVE-2026-7668
title: MikroTik RouterOS SCEP Endpoint Out-of-Bounds Read - CVE-2026-7668
id: scw-2026-05-02-ai-1
status: experimental
level: critical
description: |
Detects attempts to exploit CVE-2026-7668 by targeting the SCEP endpoint in MikroTik RouterOS. The vulnerability lies in the ASN1_STRING_data function within nova/lib/www/scep.p, which can be triggered by manipulating the 'transactionID' and 'messageType' parameters in SCEP requests, leading to an out-of-bounds read. This rule specifically looks for requests to '/scep.p' containing these vulnerable parameters.
author: SCW Feed Engine (AI-generated)
date: 2026-05-02
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7668/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/scep.p'
cs-uri-query|contains:
- 'transactionID='
- 'messageType='
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7668 | Information Disclosure | MikroTik RouterOS version 6.49.8 |
| CVE-2026-7668 | Memory Corruption | Function ASN1_STRING_data in nova/lib/www/scep.p (SCEP Endpoint component) |
| CVE-2026-7668 | Out-of-bounds Read | Manipulation of argument transactionID/messageType |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 03, 2026 at 00:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.