Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4066-1 | fort-validator security update |
Ubuntu USN |
USN-7813-1 | FORT Validator vulnerabilities |
Mon, 03 Nov 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 25 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-295 |
Wed, 28 Aug 2024 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 27 Aug 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nicmx
Nicmx fort-validator |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:nicmx:fort-validator:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Nicmx
Nicmx fort-validator |
|
| Metrics |
cvssV3_1
|
Sat, 24 Aug 2024 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) an ROA or a Manifest containing a signedAttrs encoded in non-canonical form. This bypasses Fort's BER decoder, reaching a point in the code that panics when faced with data not encoded in DER. Because Fort is an RPKI Relying Party, a panic can lead to Route Origin Validation unavailability, which can lead to compromised routing. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-03T20:39:02.238Z
Reserved: 2024-08-24T00:00:00.000Z
Link: CVE-2024-45234
Updated: 2025-11-03T20:39:02.238Z
Status : Modified
Published: 2024-08-24T23:15:04.037
Modified: 2025-11-03T21:16:19.990
Link: CVE-2024-45234
No data.
OpenCVE Enrichment
No data.
Debian DLA
Ubuntu USN