CVE-2024-45238: n/a
An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing a bit string that doesn't properly decode into a Subject Public Key. OpenSSL does not report this problem during parsing, and when compiled with OpenSSL libcrypto versions below 3, Fort recklessly dereferences the pointer. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.
AI Analysis
Technical Summary
CVE-2024-45238 is a vulnerability in Fort, an RPKI Relying Party software used to validate Route Origin Authorizations (ROAs) in internet routing security. The issue arises when Fort processes resource certificates served by a malicious RPKI repository that is descended from a trusted Trust Anchor. The attacker can craft a resource certificate containing a bit string that does not properly decode into a valid Subject Public Key. OpenSSL versions prior to 3 do not flag this malformed bit string during parsing, causing Fort to dereference an invalid pointer due to improper validation. This results in a crash of the Fort process, leading to unavailability of Route Origin Validation services. Since Fort is responsible for validating routing information, its failure can cause routing decisions to be made without RPKI validation, increasing the risk of route hijacking or misrouting. The vulnerability can be triggered remotely via rsync or RRDP protocols used to fetch RPKI data, requires no privileges or user interaction, and affects Fort versions before 1.6.3. The underlying cause relates to improper handling of null pointer dereference (CWE-476). Although no exploits are currently known in the wild, the vulnerability poses a significant risk to routing infrastructure relying on Fort for RPKI validation. The CVSS 3.1 base score is 7.5, reflecting network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no impact on confidentiality or integrity, but high impact on availability.
Potential Impact
For European organizations, especially ISPs, network operators, and internet exchange points relying on Fort for RPKI validation, this vulnerability can cause temporary loss of Route Origin Validation. This unavailability can lead to acceptance of invalid or malicious routing announcements, increasing the risk of route hijacking, traffic interception, or denial of service. Critical infrastructure providers and large enterprises dependent on secure routing may experience degraded network security posture and potential service disruptions. The impact is primarily on availability of routing validation, which indirectly affects integrity and trustworthiness of routing decisions. Given the increasing adoption of RPKI in Europe to secure BGP routing, exploitation could undermine routing security and trust in the affected networks. Although no direct confidentiality breach occurs, the potential for traffic misdirection or interception poses serious operational risks. The lack of known exploits suggests a window for proactive mitigation before active attacks emerge.
Mitigation Recommendations
European organizations using Fort should upgrade to version 1.6.3 or later, where this vulnerability is fixed. If immediate upgrade is not possible, organizations should consider deploying network-level protections to restrict access to RPKI repositories, especially limiting rsync and RRDP traffic to trusted sources. Monitoring Fort logs for crashes or unusual behavior can provide early warning of exploitation attempts. Implementing redundancy in RPKI validation infrastructure can reduce impact of a single instance crashing. Additionally, organizations should verify that their OpenSSL libraries are updated to version 3 or later, as this mitigates the parsing issue at the cryptographic library level. Network operators should coordinate with upstream providers and RPKI Trust Anchor operators to ensure repository integrity and monitor for suspicious repository behavior. Regular vulnerability scanning and patch management processes should prioritize this update due to its impact on routing security. Finally, consider deploying fallback routing policies that minimize risk during RPKI validation outages.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland, Belgium, Switzerland
CVE-2024-45238: n/a
Description
An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing a bit string that doesn't properly decode into a Subject Public Key. OpenSSL does not report this problem during parsing, and when compiled with OpenSSL libcrypto versions below 3, Fort recklessly dereferences the pointer. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.
AI-Powered Analysis
Technical Analysis
CVE-2024-45238 is a vulnerability in Fort, an RPKI Relying Party software used to validate Route Origin Authorizations (ROAs) in internet routing security. The issue arises when Fort processes resource certificates served by a malicious RPKI repository that is descended from a trusted Trust Anchor. The attacker can craft a resource certificate containing a bit string that does not properly decode into a valid Subject Public Key. OpenSSL versions prior to 3 do not flag this malformed bit string during parsing, causing Fort to dereference an invalid pointer due to improper validation. This results in a crash of the Fort process, leading to unavailability of Route Origin Validation services. Since Fort is responsible for validating routing information, its failure can cause routing decisions to be made without RPKI validation, increasing the risk of route hijacking or misrouting. The vulnerability can be triggered remotely via rsync or RRDP protocols used to fetch RPKI data, requires no privileges or user interaction, and affects Fort versions before 1.6.3. The underlying cause relates to improper handling of null pointer dereference (CWE-476). Although no exploits are currently known in the wild, the vulnerability poses a significant risk to routing infrastructure relying on Fort for RPKI validation. The CVSS 3.1 base score is 7.5, reflecting network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no impact on confidentiality or integrity, but high impact on availability.
Potential Impact
For European organizations, especially ISPs, network operators, and internet exchange points relying on Fort for RPKI validation, this vulnerability can cause temporary loss of Route Origin Validation. This unavailability can lead to acceptance of invalid or malicious routing announcements, increasing the risk of route hijacking, traffic interception, or denial of service. Critical infrastructure providers and large enterprises dependent on secure routing may experience degraded network security posture and potential service disruptions. The impact is primarily on availability of routing validation, which indirectly affects integrity and trustworthiness of routing decisions. Given the increasing adoption of RPKI in Europe to secure BGP routing, exploitation could undermine routing security and trust in the affected networks. Although no direct confidentiality breach occurs, the potential for traffic misdirection or interception poses serious operational risks. The lack of known exploits suggests a window for proactive mitigation before active attacks emerge.
Mitigation Recommendations
European organizations using Fort should upgrade to version 1.6.3 or later, where this vulnerability is fixed. If immediate upgrade is not possible, organizations should consider deploying network-level protections to restrict access to RPKI repositories, especially limiting rsync and RRDP traffic to trusted sources. Monitoring Fort logs for crashes or unusual behavior can provide early warning of exploitation attempts. Implementing redundancy in RPKI validation infrastructure can reduce impact of a single instance crashing. Additionally, organizations should verify that their OpenSSL libraries are updated to version 3 or later, as this mitigates the parsing issue at the cryptographic library level. Network operators should coordinate with upstream providers and RPKI Trust Anchor operators to ensure repository integrity and monitor for suspicious repository behavior. Regular vulnerability scanning and patch management processes should prioritize this update due to its impact on routing security. Finally, consider deploying fallback routing policies that minimize risk during RPKI validation outages.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
 - 5.2
 - Assigner Short Name
 - mitre
 - Date Reserved
 - 2024-08-24T00:00:00.000Z
 - Cvss Version
 - 3.1
 - State
 - PUBLISHED
 
Threat ID: 6909214ffe7723195e054685
Added to database: 11/3/2025, 9:40:31 PM
Last enriched: 11/3/2025, 9:46:06 PM
Last updated: 11/4/2025, 2:53:00 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-43507: An app may be able to fingerprint the user in Apple visionOS
MediumCVE-2025-43505: Processing a maliciously crafted file may lead to heap corruption in Apple Xcode
HighCVE-2025-43504: A user in a privileged network position may be able to cause a denial-of-service in Apple Xcode
MediumCVE-2025-43503: Visiting a malicious website may lead to user interface spoofing in Apple Safari
HighCVE-2025-43502: An app may be able to bypass certain Privacy preferences in Apple Safari
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.