CVE-2024-45234
📋 TL;DR
A vulnerability in FORT RPKI validator before version 1.6.3 allows a malicious RPKI repository to serve specially crafted ROA or Manifest data encoded in non-canonical BER format, bypassing FORT's BER decoder and causing the application to panic. This leads to Route Origin Validation unavailability, potentially compromising routing security. Organizations using FORT as an RPKI Relying Party are affected.
💻 Affected Systems
- FORT RPKI validator
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete unavailability of Route Origin Validation leading to BGP route hijacking, traffic interception, or blackholing attacks.
Likely Case
Temporary denial of RPKI validation service requiring restart, potentially causing routing instability during the outage.
If Mitigated
Minimal impact with proper monitoring and rapid restart procedures in place.
🎯 Exploit Status
Exploitation requires control of an RPKI repository that descends from a trusted Trust Anchor, which an attacker could potentially achieve through compromised repositories or malicious registration.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.6.3
Vendor Advisory: https://nicmx.github.io/FORT-validator/CVE.html
Restart Required: Yes
Instructions:
1. Stop FORT service. 2. Update to FORT version 1.6.3 or later. 3. Restart FORT service. 4. Verify successful operation.
🔧 Temporary Workarounds
Restrict RPKI repository sources
linuxLimit FORT to only trusted, known-good RPKI repositories to reduce attack surface.
# Edit FORT configuration to whitelist specific repositories
# See FORT documentation for repository configuration
🧯 If You Can't Patch
- Implement monitoring for FORT process crashes and automatic restart mechanisms
- Deploy redundant FORT instances with load balancing to maintain RPKI validation during outages
🔍 How to Verify
Check if Vulnerable:
Check FORT version with 'fort --version' or 'rpm -q fort'/'dpkg -l fort' and verify it's below 1.6.3
Check Version:
fort --version
Verify Fix Applied:
Confirm version is 1.6.3 or higher and monitor for process stability during RPKI repository synchronization
📡 Detection & Monitoring
Log Indicators:
- FORT process panic/crash logs
- RPKI validation service interruption alerts
- Unexpected FORT restarts
Network Indicators:
- Increased BGP route changes during FORT outages
- RPKI repository connection attempts from suspicious sources
SIEM Query:
process.name="fort" AND (event.action="crash" OR log.level="panic")