Description

A validation integrity issue was discovered in Fort through 1.6.4 before 2.0.0. RPKI Relying Parties (such as Fort) are supposed to maintain a backup cache of the remote RPKI data. This can be employed as a fallback in case a new fetch fails or yields incorrect files. However, the product currently uses its cache merely as a bandwidth saving tool (because fetching is performed through deltas). If a fetch fails midway or yields incorrect files, there is no viable fallback. This leads to incomplete route origin validation data.

INFO

Published Date :

2024-12-18T00:00:00.000Z

Last Modified :

2025-02-10T22:14:44.765Z

Source :

mitre
AFFECTED PRODUCTS

The following products are affected by CVE-2024-56169 vulnerability.

Vendors Products
Nicmx
  • Fort Validator
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-56169.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact