Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-45236
HistoryAug 24, 2024 - 12:00 a.m.

CVE-2024-45236

2024-08-2400:00:00
ubuntu.com
ubuntu.com
cve-2024-45236
fort
rpki
empty signedattributes
route origin validation
compromised routing
unix

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7

Confidence

Low

EPSS

0.001

Percentile

17.7%

An issue was discovered in Fort before 1.6.3. A malicious RPKI repository
that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a
signed object containing an empty signedAttributes field. Fort accesses the
set’s elements without sanitizing it first. Because Fort is an RPKI Relying
Party, a crash can lead to Route Origin Validation unavailability, which
can lead to compromised routing.

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7

Confidence

Low

EPSS

0.001

Percentile

17.7%