CVE-2020-17366

An issue was discovered in NLnet Labs Routinator 0.1.0 through 0.7.1. It allows remote attackers to bypass intended access restrictions or to cause a denial of service on dependent routing systems by strategically withholding RPKI Route Origin Authorisation ".roa" files or X509 Certificate Revocation List files from the RPKI relying party's view.
References
Link Resource
https://github.com/NLnetLabs/routinator/issues/319 Exploit Issue Tracking Third Party Advisory
https://github.com/NLnetLabs/routinator/releases/tag/v0.8.0 Release Notes Third Party Advisory
https://github.com/NLnetLabs/routinator/issues/319 Exploit Issue Tracking Third Party Advisory
https://github.com/NLnetLabs/routinator/releases/tag/v0.8.0 Release Notes Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:nlnetlabs:routinator:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:07

Type Values Removed Values Added
References () https://github.com/NLnetLabs/routinator/issues/319 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/NLnetLabs/routinator/issues/319 - Exploit, Issue Tracking, Third Party Advisory
References () https://github.com/NLnetLabs/routinator/releases/tag/v0.8.0 - Release Notes, Third Party Advisory () https://github.com/NLnetLabs/routinator/releases/tag/v0.8.0 - Release Notes, Third Party Advisory

Information

Published : 2020-08-05 22:15

Updated : 2024-11-21 05:07


NVD link : CVE-2020-17366

Mitre link : CVE-2020-17366

CVE.ORG link : CVE-2020-17366


JSON object : View

Products Affected

nlnetlabs

  • routinator
CWE
CWE-295

Improper Certificate Validation