CVE-2025-0638

7.5 HIGH

📋 TL;DR

CVE-2025-0638 is a denial-of-service vulnerability in Routinator where specially crafted manifest files with illegal characters in filenames cause the application to panic and crash. This affects all Routinator users processing RPKI data from potentially untrusted sources. The vulnerability occurs during RPKI manifest parsing.

💻 Affected Systems

Products:
  • Routinator
Versions: All versions prior to 0.14.3
Operating Systems: All platforms running Routinator
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable when processing RPKI manifests from repositories.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained denial-of-service attacks could disrupt RPKI validation services, potentially affecting BGP routing security for dependent networks.

🟠

Likely Case

Accidental or targeted crashes of Routinator instances, requiring manual restart and causing temporary RPKI validation outages.

🟢

If Mitigated

Limited impact with proper monitoring and automated restart mechanisms in place.

🌐 Internet-Facing: HIGH - Routinator typically processes data from public RPKI repositories accessible via internet.
🏢 Internal Only: LOW - Only relevant if processing manifests from internal sources with malicious content.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to inject malicious manifest files into RPKI repositories that Routinator processes.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.14.3

Vendor Advisory: https://www.nlnetlabs.nl/downloads/routinator/CVE-2025-0638.txt

Restart Required: Yes

Instructions:

1. Stop Routinator service. 2. Update to version 0.14.3 using package manager or manual installation. 3. Restart Routinator service.

🔧 Temporary Workarounds

Input validation monitoring

all

Monitor for crashes and implement automated restart mechanisms

systemctl enable routinator
systemctl start routinator

🧯 If You Can't Patch

  • Implement process monitoring with automatic restart on crash
  • Filter or validate RPKI repository sources to trusted providers only

🔍 How to Verify

Check if Vulnerable:

Check Routinator version: if version < 0.14.3, system is vulnerable

Check Version:

routinator --version

Verify Fix Applied:

Confirm version is 0.14.3 or higher and monitor for crashes during normal operation

📡 Detection & Monitoring

Log Indicators:

  • Routinator process crashes
  • Panic messages in logs related to manifest parsing
  • Service restart events

Network Indicators:

  • Loss of RPKI validation responses
  • Increased service restart traffic

SIEM Query:

process_name:"routinator" AND (event_type:"crash" OR log_message:"panic")

🔗 References

📤 Share & Export