Description
In NLnet Labs Routinator 0.9.0 up to and including 0.11.2, due to a mistake in error handling, data in RRDP snapshot and delta files that isn’t correctly base 64 encoded is treated as a fatal error and causes Routinator to exit. Worst case impact of this vulnerability is denial of service for the RPKI data that Routinator provides to routers. This may stop your network from validating route origins based on RPKI data. This vulnerability does not allow an attacker to manipulate RPKI data.
Published: 2022-09-13
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-6868 In NLnet Labs Routinator 0.9.0 up to and including 0.11.2, due to a mistake in error handling, data in RRDP snapshot and delta files that isn’t correctly base 64 encoded is treated as a fatal error and causes Routinator to exit. Worst case impact of this vulnerability is denial of service for the RPKI data that Routinator provides to routers. This may stop your network from validating route origins based on RPKI data. This vulnerability does not allow an attacker to manipulate RPKI data.
Github GHSA Github GHSA GHSA-m4vx-ccrf-w399 NLnet Labs Routinator has Reachable Assertion vulnerability
History

No history.

Subscriptions

Nlnetlabs Routinator
cve-icon MITRE

Status: PUBLISHED

Assigner: NLnet Labs

Published:

Updated: 2024-09-16T17:49:23.765Z

Reserved: 2022-08-29T00:00:00.000Z

Link: CVE-2022-3029

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-09-13T16:15:09.230

Modified: 2024-11-21T07:18:40.107

Link: CVE-2022-3029

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses