Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45238: n/a

0
High
VulnerabilityCVE-2024-45238cvecve-2024-45238
Published: Sat Aug 24 2024 (08/24/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing a bit string that doesn't properly decode into a Subject Public Key. OpenSSL does not report this problem during parsing, and when compiled with OpenSSL libcrypto versions below 3, Fort recklessly dereferences the pointer. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.

AI-Powered Analysis

AILast updated: 11/03/2025, 21:46:06 UTC

Technical Analysis

CVE-2024-45238 is a vulnerability in Fort, an RPKI Relying Party software used to validate Route Origin Authorizations (ROAs) in internet routing security. The issue arises when Fort processes resource certificates served by a malicious RPKI repository that is descended from a trusted Trust Anchor. The attacker can craft a resource certificate containing a bit string that does not properly decode into a valid Subject Public Key. OpenSSL versions prior to 3 do not flag this malformed bit string during parsing, causing Fort to dereference an invalid pointer due to improper validation. This results in a crash of the Fort process, leading to unavailability of Route Origin Validation services. Since Fort is responsible for validating routing information, its failure can cause routing decisions to be made without RPKI validation, increasing the risk of route hijacking or misrouting. The vulnerability can be triggered remotely via rsync or RRDP protocols used to fetch RPKI data, requires no privileges or user interaction, and affects Fort versions before 1.6.3. The underlying cause relates to improper handling of null pointer dereference (CWE-476). Although no exploits are currently known in the wild, the vulnerability poses a significant risk to routing infrastructure relying on Fort for RPKI validation. The CVSS 3.1 base score is 7.5, reflecting network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no impact on confidentiality or integrity, but high impact on availability.

Potential Impact

For European organizations, especially ISPs, network operators, and internet exchange points relying on Fort for RPKI validation, this vulnerability can cause temporary loss of Route Origin Validation. This unavailability can lead to acceptance of invalid or malicious routing announcements, increasing the risk of route hijacking, traffic interception, or denial of service. Critical infrastructure providers and large enterprises dependent on secure routing may experience degraded network security posture and potential service disruptions. The impact is primarily on availability of routing validation, which indirectly affects integrity and trustworthiness of routing decisions. Given the increasing adoption of RPKI in Europe to secure BGP routing, exploitation could undermine routing security and trust in the affected networks. Although no direct confidentiality breach occurs, the potential for traffic misdirection or interception poses serious operational risks. The lack of known exploits suggests a window for proactive mitigation before active attacks emerge.

Mitigation Recommendations

European organizations using Fort should upgrade to version 1.6.3 or later, where this vulnerability is fixed. If immediate upgrade is not possible, organizations should consider deploying network-level protections to restrict access to RPKI repositories, especially limiting rsync and RRDP traffic to trusted sources. Monitoring Fort logs for crashes or unusual behavior can provide early warning of exploitation attempts. Implementing redundancy in RPKI validation infrastructure can reduce impact of a single instance crashing. Additionally, organizations should verify that their OpenSSL libraries are updated to version 3 or later, as this mitigates the parsing issue at the cryptographic library level. Network operators should coordinate with upstream providers and RPKI Trust Anchor operators to ensure repository integrity and monitor for suspicious repository behavior. Regular vulnerability scanning and patch management processes should prioritize this update due to its impact on routing security. Finally, consider deploying fallback routing policies that minimize risk during RPKI validation outages.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-08-24T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6909214ffe7723195e054685

Added to database: 11/3/2025, 9:40:31 PM

Last enriched: 11/3/2025, 9:46:06 PM

Last updated: 11/4/2025, 2:53:00 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats