CVE-2021-3761 – github.com/cloudflare/cfrpki
Package
Manager: go
Name: github.com/cloudflare/cfrpki
Vulnerable Version: >=0 <1.3.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.0045 pctl0.62739
Details
OctoRPKI lacks contextual out-of-bounds check when validating RPKI ROA maxLength values Any CA issuer in the RPKI can trick OctoRPKI prior to https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422 into emitting an invalid VRP "MaxLength" value, causing RTR sessions to terminate. ### Impact An attacker can use this to disable RPKI Origin Validation in a victim network (for example AS 13335 - Cloudflare) prior to launching a BGP hijack which during normal operations would be rejected as "RPKI invalid". Additionally, in certain deployments RTR session flapping in and of itself also could cause BGP routing churn, causing availability issues. ### Patches https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422 https://github.com/cloudflare/cfrpki/releases/tag/v1.3.0 ### For more information If you have any questions or comments about this advisory: * Email us at [security@cloudflare.com](security@cloudflare.com)
Metadata
Created: 2021-09-07T23:02:18Z
Modified: 2021-09-03T21:40:39Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/09/GHSA-c8xp-8mf3-62h9/GHSA-c8xp-8mf3-62h9.json
CWE IDs: ["CWE-295", "CWE-787"]
Alternative ID: GHSA-c8xp-8mf3-62h9
Finding: F111
Auto approve: 1