Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-56375: CWE-191 Integer Underflow (Wrap or Wraparound) in nicmx fort-validator

0
High
VulnerabilityCVE-2024-56375cvecve-2024-56375cwe-191
Published: Sun Dec 22 2024 (12/22/2024, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: nicmx
Product: fort-validator

Description

CVE-2024-56375 is a high-severity integer underflow vulnerability in nicmx's fort-validator version 1. 6. 3. It arises when a malicious RPKI repository, trusted via a Trust Anchor, serves a Manifest RPKI object with an empty fileList. The fort-validator attempts to shuffle this empty array, causing an integer underflow that leads to an infinite loop and out-of-bounds memory access, resulting in a crash and denial of service. The vulnerability requires no authentication or user interaction and can be exploited remotely via network protocols like rsync or RRDP. Although no known exploits are currently reported in the wild, the impact on availability is significant. Organizations relying on fort-validator for RPKI validation should upgrade to versions beyond 1. 6. 4 to mitigate this issue.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:12:48 UTC

Technical Analysis

CVE-2024-56375 is an integer underflow vulnerability classified under CWE-191 found in nicmx's fort-validator versions 1.6.3 and 1.6.4 prior to 1.6.5. The flaw occurs when fort-validator processes a Manifest RPKI object containing an empty fileList served by a malicious RPKI repository that is descended from a trusted Trust Anchor. During the shuffle operation of the fileList array, the code dereferences and writes to this empty array before the validation logic that would normally reject an empty fileList is executed. This leads to an integer underflow causing the loop controlling the shuffle to iterate infinitely, resulting in out-of-bounds memory access. The consequence is a near-certain crash of the fort-validator process, causing a denial of service. The vulnerability can be triggered remotely via standard RPKI repository synchronization protocols such as rsync or RRDP without requiring any authentication or user interaction. The CVSS v3.1 score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, and a significant impact on availability. No known exploits have been reported in the wild as of the publication date. The vulnerability affects critical components of the RPKI ecosystem, which is essential for securing internet routing infrastructure.

Potential Impact

The primary impact of CVE-2024-56375 is a denial of service condition on fort-validator instances used in RPKI validation. Organizations relying on fort-validator for validating RPKI data may experience service outages or disruptions in routing security validation, potentially leading to degraded network security posture. This can affect ISPs, internet exchange points, and enterprises that depend on RPKI to prevent route hijacking and misconfigurations. The vulnerability does not directly compromise confidentiality or integrity but undermines availability, which can indirectly increase the risk of routing attacks if validation services are unavailable. Since fort-validator is a critical component in the RPKI ecosystem, widespread exploitation could disrupt internet routing security infrastructure, especially in regions with heavy RPKI adoption. The ease of remote exploitation without authentication increases the risk of automated attacks causing outages.

Mitigation Recommendations

To mitigate CVE-2024-56375, organizations should immediately upgrade fort-validator to version 1.6.5 or later, where the integer underflow and associated infinite loop have been fixed. Until an upgrade is possible, administrators should consider implementing network-level filtering to restrict access to RPKI repository synchronization endpoints (rsync and RRDP) to trusted sources only, reducing exposure to malicious repositories. Monitoring fort-validator logs and system health for signs of crashes or infinite loops can provide early detection of exploitation attempts. Additionally, validating the integrity and correctness of RPKI repository data before processing can help prevent malformed manifests from triggering the vulnerability. Organizations should also maintain up-to-date backups and failover mechanisms for RPKI validation services to minimize downtime. Engaging with the fort-validator vendor or community for patches and advisories is recommended.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-12-22T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bd4b7ef31ef0b55b423

Added to database: 2/25/2026, 9:38:28 PM

Last enriched: 2/26/2026, 2:12:48 AM

Last updated: 2/26/2026, 6:13:42 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats