CVE-2024-45237

9.8 CRITICAL

📋 TL;DR

This vulnerability allows a malicious RPKI repository to trigger a buffer overflow in FORT validator versions before 1.6.3 by serving a specially crafted resource certificate with an oversized Key Usage extension. Attackers could potentially execute arbitrary code or crash the service. Organizations using FORT for RPKI validation are affected.

💻 Affected Systems

Products:
  • FORT validator
Versions: All versions before 1.6.3
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using FORT to validate RPKI repositories via rsync or RRDP protocols.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the privileges of the FORT process, potentially leading to complete system compromise, data exfiltration, or lateral movement within the network.

🟠

Likely Case

Service crash (denial of service) disrupting RPKI validation and potentially affecting BGP routing security.

🟢

If Mitigated

Limited to service disruption if proper segmentation and least privilege controls are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires the attacker to control or compromise a downstream RPKI repository from a trusted Trust Anchor.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.6.3

Vendor Advisory: https://nicmx.github.io/FORT-validator/CVE.html

Restart Required: Yes

Instructions:

1. Download FORT 1.6.3 or later from the official repository. 2. Stop the FORT service. 3. Install the updated version following the platform-specific installation guide. 4. Restart the FORT service.

🔧 Temporary Workarounds

Temporary repository filtering

linux

Configure FORT to only sync with trusted RPKI repositories and block untrusted sources at network level.

# Configure FORT's TAL files to only include trusted repositories
# Use firewall rules to block rsync/RRDP from untrusted sources

🧯 If You Can't Patch

  • Disable FORT service if RPKI validation is not critical for your environment.
  • Implement strict network segmentation to isolate FORT instances from untrusted networks.

🔍 How to Verify

Check if Vulnerable:

Check the FORT version with 'fort --version' or examine the installed package version. Versions below 1.6.3 are vulnerable.

Check Version:

fort --version

Verify Fix Applied:

After updating, run 'fort --version' to confirm version 1.6.3 or higher is installed and verify the service starts without errors.

📡 Detection & Monitoring

Log Indicators:

  • FORT service crashes or unexpected termination
  • Error messages related to certificate parsing or buffer overflows in system logs

Network Indicators:

  • Unusual rsync or RRDP traffic patterns from RPKI repositories
  • Multiple connection attempts to FORT from suspicious sources

SIEM Query:

source="fort.log" AND ("crash" OR "segmentation fault" OR "buffer overflow")

🔗 References

📤 Share & Export