CVE-2024-45239: n/a
An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) an ROA or a Manifest containing a null eContent field. Fort dereferences the pointer without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.
AI Analysis
Technical Summary
CVE-2024-45239 is a vulnerability identified in Fort, an RPKI Relying Party software used to validate Route Origin Authorizations (ROAs) and Manifests in the Resource Public Key Infrastructure (RPKI) ecosystem. The issue arises when Fort processes data from a malicious RPKI repository that is descended from a trusted Trust Anchor. Specifically, the attacker can craft an ROA or Manifest containing a null eContent field, which Fort dereferences without first checking for null pointers (CWE-476: NULL Pointer Dereference). This leads to a crash of the Fort process. Since Fort is responsible for validating route origins to ensure that IP prefixes are announced only by authorized Autonomous Systems, its crash results in Route Origin Validation becoming unavailable. This unavailability can allow invalid or malicious BGP route announcements to propagate, potentially leading to traffic hijacking, interception, or denial of service. The vulnerability is remotely exploitable without authentication or user interaction, with a CVSS 3.1 score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating a high impact on availability but no direct confidentiality or integrity compromise. No public exploits are known yet, but the risk remains significant due to the critical role of RPKI in securing internet routing.
Potential Impact
For European organizations, particularly ISPs, network operators, and critical infrastructure providers relying on Fort for RPKI validation, this vulnerability poses a significant risk. A crash in Fort can disable Route Origin Validation, undermining the security of BGP routing and increasing the risk of route hijacking or misrouting attacks. This can lead to traffic interception, service disruption, or loss of connectivity. Given the reliance on RPKI to prevent route leaks and hijacks, the unavailability of validation services can degrade trust in routing security and potentially impact large segments of internet traffic. The impact is especially critical for organizations managing large IP address spaces or those involved in internet backbone operations. Additionally, regulatory requirements in Europe around network security and resilience may increase the urgency to address this vulnerability promptly.
Mitigation Recommendations
The primary mitigation is to upgrade Fort to version 1.6.3 or later, where this null pointer dereference issue has been fixed. Organizations should implement strict validation and monitoring of RPKI repositories to detect malformed or suspicious ROAs and Manifests. Deploying redundancy for RPKI validation services can help maintain availability if one instance crashes. Network operators should also monitor BGP announcements for anomalies that may indicate routing attacks stemming from validation failures. Incorporating automated alerting for Fort process crashes or validation failures will enable rapid response. Additionally, applying network-level protections such as prefix filtering and route validation policies can reduce the impact of compromised route origin validation. Coordination with upstream providers and RPKI Trust Anchor operators to ensure repository integrity is also recommended.
Affected Countries
Germany, Netherlands, United Kingdom, France, Sweden, Italy, Spain
CVE-2024-45239: n/a
Description
An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) an ROA or a Manifest containing a null eContent field. Fort dereferences the pointer without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.
AI-Powered Analysis
Technical Analysis
CVE-2024-45239 is a vulnerability identified in Fort, an RPKI Relying Party software used to validate Route Origin Authorizations (ROAs) and Manifests in the Resource Public Key Infrastructure (RPKI) ecosystem. The issue arises when Fort processes data from a malicious RPKI repository that is descended from a trusted Trust Anchor. Specifically, the attacker can craft an ROA or Manifest containing a null eContent field, which Fort dereferences without first checking for null pointers (CWE-476: NULL Pointer Dereference). This leads to a crash of the Fort process. Since Fort is responsible for validating route origins to ensure that IP prefixes are announced only by authorized Autonomous Systems, its crash results in Route Origin Validation becoming unavailable. This unavailability can allow invalid or malicious BGP route announcements to propagate, potentially leading to traffic hijacking, interception, or denial of service. The vulnerability is remotely exploitable without authentication or user interaction, with a CVSS 3.1 score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating a high impact on availability but no direct confidentiality or integrity compromise. No public exploits are known yet, but the risk remains significant due to the critical role of RPKI in securing internet routing.
Potential Impact
For European organizations, particularly ISPs, network operators, and critical infrastructure providers relying on Fort for RPKI validation, this vulnerability poses a significant risk. A crash in Fort can disable Route Origin Validation, undermining the security of BGP routing and increasing the risk of route hijacking or misrouting attacks. This can lead to traffic interception, service disruption, or loss of connectivity. Given the reliance on RPKI to prevent route leaks and hijacks, the unavailability of validation services can degrade trust in routing security and potentially impact large segments of internet traffic. The impact is especially critical for organizations managing large IP address spaces or those involved in internet backbone operations. Additionally, regulatory requirements in Europe around network security and resilience may increase the urgency to address this vulnerability promptly.
Mitigation Recommendations
The primary mitigation is to upgrade Fort to version 1.6.3 or later, where this null pointer dereference issue has been fixed. Organizations should implement strict validation and monitoring of RPKI repositories to detect malformed or suspicious ROAs and Manifests. Deploying redundancy for RPKI validation services can help maintain availability if one instance crashes. Network operators should also monitor BGP announcements for anomalies that may indicate routing attacks stemming from validation failures. Incorporating automated alerting for Fort process crashes or validation failures will enable rapid response. Additionally, applying network-level protections such as prefix filtering and route validation policies can reduce the impact of compromised route origin validation. Coordination with upstream providers and RPKI Trust Anchor operators to ensure repository integrity is also recommended.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
 - 5.2
 - Assigner Short Name
 - mitre
 - Date Reserved
 - 2024-08-24T00:00:00.000Z
 - Cvss Version
 - 3.1
 - State
 - PUBLISHED
 
Threat ID: 6909214ffe7723195e054689
Added to database: 11/3/2025, 9:40:31 PM
Last enriched: 11/3/2025, 9:45:57 PM
Last updated: 11/4/2025, 2:24:24 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-43507: An app may be able to fingerprint the user in Apple visionOS
MediumCVE-2025-43505: Processing a maliciously crafted file may lead to heap corruption in Apple Xcode
HighCVE-2025-43504: A user in a privileged network position may be able to cause a denial-of-service in Apple Xcode
MediumCVE-2025-43503: Visiting a malicious website may lead to user interface spoofing in Apple Safari
HighCVE-2025-43502: An app may be able to bypass certain Privacy preferences in Apple Safari
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.