I’ve just checked to confirm that all of my production servers are using OpenSSL 1.x, which is not affected.
I do not know of RouterOS uses OpenSSL, or LibreSSL or something else as their crypto library though so checking in here sounded like a good idea.
When can we expect a formal response from Mikrotik regarding these vulnerabilities?
At this time CISA and the NCSC-NL are maintaining a list of all affected/unaffected products at the following site and Mikrotik products are not listed:
It would be interesting to get some info from Mikrotik.
However: many contemporary major software projects, such as apache httpd or haproxy, are based on OpenSSL version 1.1. Some, including nginx, support both 1.1 and 3.0.
I wouldn’t be surprised if Mikrotik is as well (and might remain at openssl v1.1 for a long time). And in this case it’s no wonder if it’s not impacted by openssl 3.0 vulnerability.
Except the openssl license file present in the firmware, I see no sign of openssl anywhere.
From where did anyone got the ideea that RouterOS is even using OpenSSL? @webformix ?
Thank you Guntis for putting the trolls and clickbaiters to bed.
I am going to have to add you to my NOTE (that annoyingly pops up everytime I log into my hex LOL)