Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-45234
HistoryAug 24, 2024 - 12:00 a.m.

CVE-2024-45234

2024-08-2400:00:00
ubuntu.com
ubuntu.com
fort
rpki repository
ber decoder
route origin validation
compromised routing

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.1

Confidence

Low

EPSS

0.001

Percentile

17.7%

An issue was discovered in Fort before 1.6.3. A malicious RPKI repository
that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP)
an ROA or a Manifest containing a signedAttrs encoded in non-canonical
form. This bypasses Fort’s BER decoder, reaching a point in the code that
panics when faced with data not encoded in DER. Because Fort is an RPKI
Relying Party, a panic can lead to Route Origin Validation unavailability,
which can lead to compromised routing.

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.1

Confidence

Low

EPSS

0.001

Percentile

17.7%