An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing a bit string that doesn't properly decode into a Subject Public Key. OpenSSL does not report this problem during parsing, and when compiled with OpenSSL libcrypto versions below 3, Fort recklessly dereferences the pointer. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-4066-1 fort-validator security update
Ubuntu USN Ubuntu USN USN-7813-1 FORT Validator vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 04 Nov 2025 06:30:00 +0900

Type Values Removed Values Added
References

Wed, 23 Apr 2025 01:45:00 +0900

Type Values Removed Values Added
First Time appeared Nicmx
Nicmx fort Validator
CPEs cpe:2.3:a:nicmx:fort_validator:*:*:*:*:*:*:*:*
Vendors & Products Nicmx
Nicmx fort Validator

Tue, 27 Aug 2024 01:30:00 +0900

Type Values Removed Values Added
First Time appeared Fort Validator Project
Fort Validator Project fort Validator
Weaknesses CWE-476
CPEs cpe:2.3:a:fort_validator_project:fort_validator:*:*:*:*:*:*:*:*
Vendors & Products Fort Validator Project
Fort Validator Project fort Validator
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 25 Aug 2024 07:45:00 +0900

Type Values Removed Values Added
Description An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing a bit string that doesn't properly decode into a Subject Public Key. OpenSSL does not report this problem during parsing, and when compiled with OpenSSL libcrypto versions below 3, Fort recklessly dereferences the pointer. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-03T20:39:07.972Z

Reserved: 2024-08-24T00:00:00.000Z

Link: CVE-2024-45238

cve-icon Vulnrichment

Updated: 2024-08-26T16:09:26.421Z

cve-icon NVD

Status : Modified

Published: 2024-08-24T23:15:04.303

Modified: 2025-11-03T21:16:20.763

Link: CVE-2024-45238

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses