Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45234: n/a

0
High
VulnerabilityCVE-2024-45234cvecve-2024-45234
Published: Sat Aug 24 2024 (08/24/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) an ROA or a Manifest containing a signedAttrs encoded in non-canonical form. This bypasses Fort's BER decoder, reaching a point in the code that panics when faced with data not encoded in DER. Because Fort is an RPKI Relying Party, a panic can lead to Route Origin Validation unavailability, which can lead to compromised routing.

AI-Powered Analysis

AILast updated: 11/03/2025, 21:47:20 UTC

Technical Analysis

CVE-2024-45234 is a vulnerability in Fort, an RPKI relying party software used to validate Route Origin Authorizations (ROAs) and Manifests in the Resource Public Key Infrastructure (RPKI) system. The flaw arises when a malicious RPKI repository, which is trusted because it descends from a valid Trust Anchor, serves ROAs or Manifests containing signedAttrs encoded in a non-canonical BER (Basic Encoding Rules) format rather than the expected DER (Distinguished Encoding Rules) format. Fort’s BER decoder fails to properly handle this non-canonical encoding, bypassing normal validation checks and causing the software to panic (crash). This panic leads to unavailability of Route Origin Validation, a critical process that ensures that IP prefixes are only announced by authorized Autonomous Systems. Without this validation, routing decisions can be compromised, potentially allowing route hijacking or traffic interception. The vulnerability can be exploited remotely via standard RPKI repository synchronization protocols such as rsync or RRDP, without requiring authentication or user interaction. The CVSS v3.1 score of 7.5 reflects the vulnerability’s network attack vector, low attack complexity, no privileges required, and no user interaction, combined with a high impact on availability. While no public exploits are currently known, the vulnerability represents a significant risk to the security and stability of internet routing infrastructure relying on Fort. Fort versions prior to 1.6.3 are affected, and upgrading to 1.6.3 or later is necessary to remediate the issue. The vulnerability is associated with CWE-295 (Improper Certificate Validation), highlighting the importance of strict encoding validation in cryptographic protocols.

Potential Impact

For European organizations, particularly ISPs, network operators, and internet exchange points that rely on Fort for RPKI validation, this vulnerability poses a serious risk to routing security and network availability. A successful exploit can cause Fort to crash, resulting in the loss of Route Origin Validation capabilities. This can lead to acceptance of invalid or malicious route announcements, enabling route hijacking, traffic interception, or denial of service through routing disruptions. Such incidents could impact critical infrastructure, financial institutions, government networks, and large enterprises dependent on stable and secure internet connectivity. The disruption of routing validation services could also undermine trust in the RPKI system, complicating incident response and remediation efforts. Given the network-wide impact of routing anomalies, the consequences can extend beyond a single organization, affecting broader internet stability and security within Europe.

Mitigation Recommendations

European organizations using Fort should immediately upgrade to version 1.6.3 or later, where this vulnerability is fixed. In addition, network operators should implement strict validation of RPKI data encoding to detect and reject non-canonical BER encodings before they reach Fort. Deploying monitoring tools that alert on unexpected RPKI repository behavior or Fort process crashes can provide early warning of exploitation attempts. Organizations should also consider deploying redundant RPKI validators to maintain validation availability in case of a crash. Network operators can restrict access to RPKI repositories to trusted sources and monitor synchronization protocols (rsync, RRDP) for anomalies. Coordination with upstream providers and participation in information sharing groups focused on routing security can enhance situational awareness. Finally, organizations should review their incident response plans to include scenarios involving RPKI validation failures and routing hijacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-08-24T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6909214ffe7723195e054675

Added to database: 11/3/2025, 9:40:31 PM

Last enriched: 11/3/2025, 9:47:20 PM

Last updated: 12/19/2025, 9:58:24 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats