Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
routeros Vendor: mikrotik

About This Product

routeros is a software product offered by mikrotik. As an operating system, this product forms the foundation of countless systems, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 82 known vulnerabilities affecting mikrotik routeros. This includes 6 critical-severity issues and 27 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2009 to 2025, indicating a sustained research interest and ongoing security attention. 48 medium-severity issues and 1 low-severity issue complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2008-6976 2009-08-19 2025-04-09 - 6.4 Likely
CVE-2012-6050 2012-11-27 2025-04-11 - 6.4 Likely
CVE-2015-2350 2015-03-19 2025-04-12 - 6.8 Likely
CVE-2017-6297 2017-02-27 2025-04-20 5.9 4.3 Likely
CVE-2017-6444 2017-03-12 2025-04-20 7.5 7.8 Likely
CVE-2017-7285 2017-03-29 2025-04-20 7.5 7.8 Likely
CVE-2017-8338 2017-05-18 2025-04-20 7.5 7.8 Likely
CVE-2018-7445 2018-03-19 2025-11-07 9.8 10.0 Likely
CVE-2018-10066 2018-04-13 2024-11-21 8.1 6.8 Likely
CVE-2018-14847 2018-08-02 2025-11-07 9.1 6.4 Likely
CVE-2018-1156 2018-08-23 2024-11-21 8.8 9.0 Likely
CVE-2018-1157 2018-08-23 2024-11-21 6.5 6.8 Likely
CVE-2018-1158 2018-08-23 2024-11-21 6.5 4.0 Likely
CVE-2018-1159 2018-08-23 2024-11-21 6.5 4.0 Likely
CVE-2019-3924 2019-02-20 2025-08-15 7.5 5.0 Likely
CVE-2019-3943 2019-04-10 2024-11-21 8.1 7.5 Likely
CVE-2019-13074 2019-07-03 2024-11-21 7.5 7.8 Likely
CVE-2019-13954 2019-07-26 2024-11-21 6.5 6.8 Likely
CVE-2019-13955 2019-07-26 2024-11-21 6.5 4.0 Likely
CVE-2019-15055 2019-08-26 2024-11-21 6.5 5.5 Likely
CVE-2019-3976 2019-10-29 2024-11-21 8.8 6.5 Likely
CVE-2019-3977 2019-10-29 2024-11-21 7.5 8.5 Likely
CVE-2019-3978 2019-10-29 2024-11-21 7.5 5.0 Likely
CVE-2019-3979 2019-10-29 2024-11-21 7.5 5.0 Likely
CVE-2019-3981 2020-01-14 2024-11-21 3.7 4.3 Likely
CVE-2018-5951 2020-03-02 2024-11-21 7.5 7.1 Likely
CVE-2020-10364 2020-03-23 2024-11-21 7.5 7.8 Likely
CVE-2020-11881 2020-09-14 2024-11-21 7.5 5.0 Likely
CVE-2019-16160 2020-10-07 2024-11-21 7.5 5.0 Likely
CVE-2021-3014 2021-01-04 2024-11-21 6.1 4.3 Likely
CVE-2021-27221 2021-03-19 2024-11-21 8.1 8.5 Likely
CVE-2020-20218 2021-05-03 2024-11-21 6.5 4.0 Likely
CVE-2020-20247 2021-05-03 2024-11-21 6.5 4.0 Likely
CVE-2020-20265 2021-05-11 2024-11-21 6.5 4.0 Likely
CVE-2020-20267 2021-05-11 2024-11-21 6.5 4.0 Likely
CVE-2020-20253 2021-05-18 2024-11-21 6.5 4.0 Likely
CVE-2020-20254 2021-05-18 2024-11-21 6.5 4.0 Likely
CVE-2020-20214 2021-05-18 2024-11-21 6.5 4.0 Likely
CVE-2020-20222 2021-05-18 2024-11-21 6.5 4.0 Likely
CVE-2020-20236 2021-05-18 2024-11-21 6.5 4.0 Likely
CVE-2020-20237 2021-05-18 2024-11-21 6.5 4.0 Likely
CVE-2020-20220 2021-05-18 2024-11-21 6.5 4.0 Likely
CVE-2020-20227 2021-05-18 2024-11-21 6.5 4.0 Likely
CVE-2020-20245 2021-05-18 2024-11-21 6.5 4.0 Likely
CVE-2020-20246 2021-05-18 2024-11-21 6.5 4.0 Likely
CVE-2020-20264 2021-05-19 2024-11-21 6.5 4.0 Likely
CVE-2020-20266 2021-05-19 2024-11-21 6.5 4.0 Likely
CVE-2020-20211 2021-07-07 2024-11-21 6.5 4.0 Likely
CVE-2020-20212 2021-07-07 2024-11-21 6.5 4.0 Likely
CVE-2020-20213 2021-07-07 2024-11-21 6.5 4.0 Likely
CVE-2020-20215 2021-07-07 2024-11-21 6.5 4.0 Likely
CVE-2020-20216 2021-07-07 2024-11-21 6.5 4.0 Likely
CVE-2020-20225 2021-07-07 2024-11-21 6.5 4.0 Likely
CVE-2020-20217 2021-07-08 2024-11-21 6.5 4.0 Likely
CVE-2020-20250 2021-07-13 2024-11-21 6.5 4.0 Likely
CVE-2020-20252 2021-07-13 2024-11-21 6.5 4.0 Likely
CVE-2020-20231 2021-07-14 2024-11-21 6.5 4.0 Likely
CVE-2020-20230 2021-07-19 2024-11-21 6.5 4.0 Likely
CVE-2020-20248 2021-07-19 2024-11-21 6.5 4.0 Likely
CVE-2020-20249 2021-07-19 2024-11-21 6.5 4.0 Likely
CVE-2020-20219 2021-07-21 2024-11-21 6.5 4.0 Likely
CVE-2020-20221 2021-07-21 2024-11-21 6.5 6.8 Likely
CVE-2020-20262 2021-07-21 2024-11-21 6.5 4.0 Likely
CVE-2020-22844 2022-02-28 2024-11-21 7.5 5.0 Likely
CVE-2020-22845 2022-02-28 2024-11-21 7.5 7.8 Likely
CVE-2021-41987 2022-03-16 2024-11-21 8.1 6.8 Likely
CVE-2021-36613 2022-05-11 2024-11-21 6.5 4.0 Likely
CVE-2021-36614 2022-05-11 2024-11-21 6.5 4.0 Likely
CVE-2022-34960 2022-08-25 2024-11-21 9.8 - -
CVE-2022-36522 2022-08-26 2024-11-21 6.5 - -
CVE-2017-20149 2022-10-15 2025-05-14 9.8 - -
CVE-2022-45313 2022-12-05 2025-04-24 8.8 - -
CVE-2022-45315 2022-12-05 2025-04-24 9.8 - -
CVE-2023-24094 2023-03-27 2025-02-19 7.5 - -
CVE-2020-20021 2023-07-12 2024-11-21 7.5 - -
CVE-2023-30799 2023-07-19 2025-11-21 9.1 - -
CVE-2023-30800 2023-09-07 2025-11-21 7.5 - -
CVE-2023-41570 2023-11-14 2024-11-21 5.3 - -
CVE-2023-32154 2024-05-03 2025-06-30 7.5 - -
CVE-2024-54772 2025-02-11 2025-06-30 5.4 - -
CVE-2024-54952 2025-05-29 2025-06-30 7.5 - -
CVE-2025-6443 2025-06-25 2025-08-18 7.2 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for mikrotik routeros by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.