CVE-2024-45234

7.5 HIGH

📋 TL;DR

A vulnerability in FORT RPKI validator before version 1.6.3 allows a malicious RPKI repository to serve specially crafted ROA or Manifest data encoded in non-canonical BER format, bypassing FORT's BER decoder and causing the application to panic. This leads to Route Origin Validation unavailability, potentially compromising routing security. Organizations using FORT as an RPKI Relying Party are affected.

💻 Affected Systems

Products:
  • FORT RPKI validator
Versions: All versions before 1.6.3
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects FORT installations configured as RPKI Relying Parties that connect to external RPKI repositories.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete unavailability of Route Origin Validation leading to BGP route hijacking, traffic interception, or blackholing attacks.

🟠

Likely Case

Temporary denial of RPKI validation service requiring restart, potentially causing routing instability during the outage.

🟢

If Mitigated

Minimal impact with proper monitoring and rapid restart procedures in place.

🌐 Internet-Facing: HIGH - FORT typically connects to external RPKI repositories via rsync/RRDP, making it directly exposed to malicious repositories.
🏢 Internal Only: LOW - The vulnerability requires interaction with external RPKI infrastructure, not internal-only systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires control of an RPKI repository that descends from a trusted Trust Anchor, which an attacker could potentially achieve through compromised repositories or malicious registration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.6.3

Vendor Advisory: https://nicmx.github.io/FORT-validator/CVE.html

Restart Required: Yes

Instructions:

1. Stop FORT service. 2. Update to FORT version 1.6.3 or later. 3. Restart FORT service. 4. Verify successful operation.

🔧 Temporary Workarounds

Restrict RPKI repository sources

linux

Limit FORT to only trusted, known-good RPKI repositories to reduce attack surface.

# Edit FORT configuration to whitelist specific repositories
# See FORT documentation for repository configuration

🧯 If You Can't Patch

  • Implement monitoring for FORT process crashes and automatic restart mechanisms
  • Deploy redundant FORT instances with load balancing to maintain RPKI validation during outages

🔍 How to Verify

Check if Vulnerable:

Check FORT version with 'fort --version' or 'rpm -q fort'/'dpkg -l fort' and verify it's below 1.6.3

Check Version:

fort --version

Verify Fix Applied:

Confirm version is 1.6.3 or higher and monitor for process stability during RPKI repository synchronization

📡 Detection & Monitoring

Log Indicators:

  • FORT process panic/crash logs
  • RPKI validation service interruption alerts
  • Unexpected FORT restarts

Network Indicators:

  • Increased BGP route changes during FORT outages
  • RPKI repository connection attempts from suspicious sources

SIEM Query:

process.name="fort" AND (event.action="crash" OR log.level="panic")

🔗 References

📤 Share & Export