CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H
EPSS
Percentile
38.4%
Attackers can create long chains of CAs that would lead to OctoRPKI exceeding its max iterations parameter. In consequence it would cause the program to crash, preventing it from finishing the validation and leading to a denial of service. Credits toΒ Donika Mirdita andΒ Haya Shulman - Fraunhofer SIT, ATHENE, who discovered and reported this vulnerability.
[
{
"defaultStatus": "unaffected",
"platforms": [
"Go"
],
"product": "OctoRPKI",
"repo": "https://github.com/cloudflare/cfrpki",
"vendor": "Cloudflare",
"versions": [
{
"lessThan": "<1.4.4",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
]