CVE-2022-3029Improper Handling of Unexpected Data Type in Labs Routinator

Severity
7.5HIGHNVD
EPSS
0.5%
top 32.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 13
Latest updateDec 4

Description

In NLnet Labs Routinator 0.9.0 up to and including 0.11.2, due to a mistake in error handling, data in RRDP snapshot and delta files that isn’t correctly base 64 encoded is treated as a fatal error and causes Routinator to exit. Worst case impact of this vulnerability is denial of service for the RPKI data that Routinator provides to routers. This may stop your network from validating route origins based on RPKI data. This vulnerability does not allow an attacker to manipulate RPKI data.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

crates.ionlnet_labs/routinator0.9.00.11.3
NVDnlnetlabs/routinator0.9.00.11.2
CVEListV5nlnet_labs/routinatorunspecified0.11.2

🔴Vulnerability Details

3
OSV
NLnet Labs Routinator has Reachable Assertion vulnerability2022-09-14
GHSA
NLnet Labs Routinator has Reachable Assertion vulnerability2022-09-14
CVEList
Fatal error on incorrect base64 data in RRDP2022-09-13

📄Research Papers

1
arXiv
The CURE To Vulnerabilities in RPKI Validation2023-12-04
CVE-2022-3029 — Nlnet Labs Routinator vulnerability | cvebase