CVE-2021-43173

7.5 HIGH

📋 TL;DR

CVE-2021-43173 is a denial-of-service vulnerability in NLnet Labs Routinator where malicious RRDP repositories can stall validation by slowly feeding data to keep connections alive. This causes Routinator to serve outdated data or fail to serve any data at all. Organizations using Routinator for RPKI validation are affected.

💻 Affected Systems

Products:
  • NLnet Labs Routinator
Versions: All versions prior to 0.10.2
Operating Systems: All platforms running Routinator
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all configurations using RRDP repositories. RSRYNC repositories are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Routinator becomes completely unusable, serving no RPKI validation data, potentially causing BGP routing issues or security bypasses.

🟠

Likely Case

Validation delays cause outdated RPKI data to be served, potentially allowing invalid BGP routes to be accepted.

🟢

If Mitigated

With proper patching, no impact as the timeout logic is fixed to cover complete requests.

🌐 Internet-Facing: HIGH - Routinator typically connects to external RRDP repositories over the internet.
🏢 Internal Only: LOW - Only affects connections to external RRDP repositories, not internal-only deployments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires control of an RRDP repository that Routinator connects to. The attack is simple to execute once repository control is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.10.2 and later

Vendor Advisory: https://www.nlnetlabs.nl/downloads/routinator/CVE-2021-43172_CVE-2021-43173_CVE-2021-43174.txt

Restart Required: Yes

Instructions:

1. Download Routinator 0.10.2 or later from NLnet Labs. 2. Stop the Routinator service. 3. Replace the Routinator binary with the patched version. 4. Restart the Routinator service.

🔧 Temporary Workarounds

Use RSRYNC repositories only

all

Configure Routinator to use only RSRYNC repositories instead of RRDP repositories

Edit Routinator configuration to remove or disable RRDP repository URLs

Network filtering

all

Block or rate-limit connections to untrusted RRDP repositories

Use firewall rules to restrict RRDP repository access

🧯 If You Can't Patch

  • Monitor Routinator validation times and alert on significant delays
  • Implement network controls to limit which RRDP repositories Routinator can connect to

🔍 How to Verify

Check if Vulnerable:

Check Routinator version with 'routinator --version'. If version is below 0.10.2, the system is vulnerable.

Check Version:

routinator --version

Verify Fix Applied:

After patching, verify version is 0.10.2 or higher and monitor validation completion times for normal operation.

📡 Detection & Monitoring

Log Indicators:

  • Unusually long validation times
  • RRDP connection timeouts
  • Validation runs taking significantly longer than normal

Network Indicators:

  • Long-lived TCP connections to RRDP repositories with minimal data transfer
  • Repeated connection attempts to the same repository

SIEM Query:

source="routinator" AND ("timeout" OR "validation" AND "delay" OR "RRDP" AND "slow")

🔗 References

📤 Share & Export