Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

mikrotik

About This Vendor

mikrotik is a technology vendor producing software and infrastructure products. As a software provider, mikrotik's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of mikrotik's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 87 known vulnerabilities from mikrotik. This includes 6 critical-severity issues and 30 high-severity issues that represent significant risk. These vulnerabilities affect 31 distinct products across mikrotik's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2009 through 2025, indicating decades of continuous security attention and research. Organizations deploying mikrotik products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2008-6976 2009-08-19 2025-04-09 - 6.4 Likely
CVE-2012-6050 2012-11-27 2025-04-11 - 6.4 Likely
CVE-2015-2350 2015-03-19 2025-04-12 - 6.8 Likely
CVE-2017-6297 2017-02-27 2025-04-20 5.9 4.3 Likely
CVE-2017-6444 2017-03-12 2025-04-20 7.5 7.8 Likely
CVE-2017-7285 2017-03-29 2025-04-20 7.5 7.8 Likely
CVE-2017-8338 2017-05-18 2025-04-20 7.5 7.8 Likely
CVE-2017-17538 2017-12-13 2025-04-20 7.5 7.8 Likely
CVE-2017-17537 2017-12-13 2025-04-20 7.5 5.0 Likely
CVE-2018-7445 2018-03-19 2025-11-07 9.8 10.0 Likely
CVE-2018-10066 2018-04-13 2024-11-21 8.1 6.8 Likely
CVE-2018-10070 2018-04-16 2024-11-21 7.5 7.8 Likely
CVE-2018-14847 2018-08-02 2025-11-07 9.1 6.4 Likely
CVE-2018-1156 2018-08-23 2024-11-21 8.8 9.0 Likely
CVE-2018-1157 2018-08-23 2024-11-21 6.5 6.8 Likely
CVE-2018-1158 2018-08-23 2024-11-21 6.5 4.0 Likely
CVE-2018-1159 2018-08-23 2024-11-21 6.5 4.0 Likely
CVE-2019-3924 2019-02-20 2025-08-15 7.5 5.0 Likely
CVE-2019-3943 2019-04-10 2024-11-21 8.1 7.5 Likely
CVE-2019-13074 2019-07-03 2024-11-21 7.5 7.8 Likely
CVE-2019-13954 2019-07-26 2024-11-21 6.5 6.8 Likely
CVE-2019-13955 2019-07-26 2024-11-21 6.5 4.0 Likely
CVE-2019-15055 2019-08-26 2024-11-21 6.5 5.5 Likely
CVE-2019-3976 2019-10-29 2024-11-21 8.8 6.5 Likely
CVE-2019-3977 2019-10-29 2024-11-21 7.5 8.5 Likely
CVE-2019-3978 2019-10-29 2024-11-21 7.5 5.0 Likely
CVE-2019-3979 2019-10-29 2024-11-21 7.5 5.0 Likely
CVE-2019-3981 2020-01-14 2024-11-21 3.7 4.3 Likely
CVE-2020-5720 2020-02-06 2024-11-21 5.9 4.3 Likely
CVE-2018-5951 2020-03-02 2024-11-21 7.5 7.1 Likely
CVE-2020-10364 2020-03-23 2024-11-21 7.5 7.8 Likely
CVE-2020-5721 2020-04-15 2024-11-21 5.5 2.1 Unknown
CVE-2020-11881 2020-09-14 2024-11-21 7.5 5.0 Likely
CVE-2019-16160 2020-10-07 2024-11-21 7.5 5.0 Likely
CVE-2021-3014 2021-01-04 2024-11-21 6.1 4.3 Likely
CVE-2021-27221 2021-03-19 2024-11-21 8.1 8.5 Likely
CVE-2020-20218 2021-05-03 2024-11-21 6.5 4.0 Likely
CVE-2020-20247 2021-05-03 2024-11-21 6.5 4.0 Likely
CVE-2020-20265 2021-05-11 2024-11-21 6.5 4.0 Likely
CVE-2020-20267 2021-05-11 2024-11-21 6.5 4.0 Likely
CVE-2020-20253 2021-05-18 2024-11-21 6.5 4.0 Likely
CVE-2020-20254 2021-05-18 2024-11-21 6.5 4.0 Likely
CVE-2020-20214 2021-05-18 2024-11-21 6.5 4.0 Likely
CVE-2020-20222 2021-05-18 2024-11-21 6.5 4.0 Likely
CVE-2020-20236 2021-05-18 2024-11-21 6.5 4.0 Likely
CVE-2020-20237 2021-05-18 2024-11-21 6.5 4.0 Likely
CVE-2020-20220 2021-05-18 2024-11-21 6.5 4.0 Likely
CVE-2020-20227 2021-05-18 2024-11-21 6.5 4.0 Likely
CVE-2020-20245 2021-05-18 2024-11-21 6.5 4.0 Likely
CVE-2020-20246 2021-05-18 2024-11-21 6.5 4.0 Likely
CVE-2020-20264 2021-05-19 2024-11-21 6.5 4.0 Likely
CVE-2020-20266 2021-05-19 2024-11-21 6.5 4.0 Likely
CVE-2020-20211 2021-07-07 2024-11-21 6.5 4.0 Likely
CVE-2020-20212 2021-07-07 2024-11-21 6.5 4.0 Likely
CVE-2020-20213 2021-07-07 2024-11-21 6.5 4.0 Likely
CVE-2020-20215 2021-07-07 2024-11-21 6.5 4.0 Likely
CVE-2020-20216 2021-07-07 2024-11-21 6.5 4.0 Likely
CVE-2020-20225 2021-07-07 2024-11-21 6.5 4.0 Likely
CVE-2020-20217 2021-07-08 2024-11-21 6.5 4.0 Likely
CVE-2020-20250 2021-07-13 2024-11-21 6.5 4.0 Likely
CVE-2020-20252 2021-07-13 2024-11-21 6.5 4.0 Likely
CVE-2020-20231 2021-07-14 2024-11-21 6.5 4.0 Likely
CVE-2020-20230 2021-07-19 2024-11-21 6.5 4.0 Likely
CVE-2020-20248 2021-07-19 2024-11-21 6.5 4.0 Likely
CVE-2020-20249 2021-07-19 2024-11-21 6.5 4.0 Likely
CVE-2020-20219 2021-07-21 2024-11-21 6.5 4.0 Likely
CVE-2020-20221 2021-07-21 2024-11-21 6.5 6.8 Likely
CVE-2020-20262 2021-07-21 2024-11-21 6.5 4.0 Likely
CVE-2020-22844 2022-02-28 2024-11-21 7.5 5.0 Likely
CVE-2020-22845 2022-02-28 2024-11-21 7.5 7.8 Likely
CVE-2021-41987 2022-03-16 2024-11-21 8.1 6.8 Likely
CVE-2021-36613 2022-05-11 2024-11-21 6.5 4.0 Likely
CVE-2021-36614 2022-05-11 2024-11-21 6.5 4.0 Likely
CVE-2022-34960 2022-08-25 2024-11-21 9.8 - -
CVE-2022-36522 2022-08-26 2024-11-21 6.5 - -
CVE-2017-20149 2022-10-15 2025-05-14 9.8 - -
CVE-2022-45313 2022-12-05 2025-04-24 8.8 - -
CVE-2022-45315 2022-12-05 2025-04-24 9.8 - -
CVE-2023-24094 2023-03-27 2025-02-19 7.5 - -
CVE-2020-20021 2023-07-12 2024-11-21 7.5 - -
CVE-2023-30799 2023-07-19 2025-11-21 9.1 - -
CVE-2023-30800 2023-09-07 2025-11-21 7.5 - -
CVE-2023-41570 2023-11-14 2024-11-21 5.3 - -
CVE-2023-32154 2024-05-03 2025-06-30 7.5 - -
CVE-2024-54772 2025-02-11 2025-06-30 5.4 - -
CVE-2024-54952 2025-05-29 2025-06-30 7.5 - -
CVE-2025-6443 2025-06-25 2025-08-18 7.2 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for mikrotik by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with mikrotik's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.