Description
Attackers can create long chains of CAs that would lead to OctoRPKI exceeding its max iterations parameter. In consequence it would cause the program to crash, preventing it from finishing the validation and leading to a denial of service. Credits to Donika Mirdita and Haya Shulman - Fraunhofer SIT, ATHENE, who discovered and reported this vulnerability.

Published: 2022-10-28
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-7146 Attackers can create long chains of CAs that would lead to OctoRPKI exceeding its max iterations parameter. In consequence it would cause the program to crash, preventing it from finishing the validation and leading to a denial of service. Credits to Donika Mirdita and Haya Shulman - Fraunhofer SIT, ATHENE, who discovered and reported this vulnerability.
Github GHSA Github GHSA GHSA-pmw9-567p-68pc OctoRPKI crashes when max iterations is reached
History

Mon, 05 May 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Cloudflare Octorpki
cve-icon MITRE

Status: PUBLISHED

Assigner: cloudflare

Published:

Updated: 2025-05-05T19:19:50.911Z

Reserved: 2022-10-20T11:13:34.797Z

Link: CVE-2022-3616

cve-icon Vulnrichment

Updated: 2024-08-03T01:14:03.299Z

cve-icon NVD

Status : Modified

Published: 2022-10-28T07:15:16.557

Modified: 2024-11-21T07:19:53.173

Link: CVE-2022-3616

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses