FKIE_CVE-2024-56169
Vulnerability from fkie_nvd - Published: 2024-12-18 05:15 - Updated: 2025-04-22 16:24
Severity ?
Summary
A validation integrity issue was discovered in Fort through 1.6.4 before 2.0.0. RPKI Relying Parties (such as Fort) are supposed to maintain a backup cache of the remote RPKI data. This can be employed as a fallback in case a new fetch fails or yields incorrect files. However, the product currently uses its cache merely as a bandwidth saving tool (because fetching is performed through deltas). If a fetch fails midway or yields incorrect files, there is no viable fallback. This leads to incomplete route origin validation data.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/NICMx/FORT-validator/issues/82 | Issue Tracking, Vendor Advisory | |
| cve@mitre.org | https://nicmx.github.io/FORT-validator/CVE.html | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| nicmx | fort_validator | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nicmx:fort_validator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DDE7A5D0-5B5E-4AE8-8A53-DC56021F314A",
"versionEndIncluding": "1.6.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A validation integrity issue was discovered in Fort through 1.6.4 before 2.0.0. RPKI Relying Parties (such as Fort) are supposed to maintain a backup cache of the remote RPKI data. This can be employed as a fallback in case a new fetch fails or yields incorrect files. However, the product currently uses its cache merely as a bandwidth saving tool (because fetching is performed through deltas). If a fetch fails midway or yields incorrect files, there is no viable fallback. This leads to incomplete route origin validation data."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema de integridad de validaci\u00f3n en Fort hasta la versi\u00f3n 1.6.4 anterior a la versi\u00f3n 2.0.0. Se supone que las partes que conf\u00edan en RPKI (como Fort) mantienen una cach\u00e9 de respaldo de los datos RPKI remotos. Esto se puede utilizar como una alternativa en caso de que una nueva b\u00fasqueda falle o genere archivos incorrectos. Sin embargo, el producto actualmente utiliza su cach\u00e9 simplemente como una herramienta de ahorro de ancho de banda (porque la b\u00fasqueda se realiza mediante deltas). Si una b\u00fasqueda falla a mitad de camino o genera archivos incorrectos, no hay una alternativa viable. Esto genera datos de validaci\u00f3n de origen de ruta incompletos."
}
],
"id": "CVE-2024-56169",
"lastModified": "2025-04-22T16:24:31.770",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-12-18T05:15:08.853",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/NICMx/FORT-validator/issues/82"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://nicmx.github.io/FORT-validator/CVE.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-354"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…