An issue was discovered in RIPE NCC RPKI Validator 3.x through 3.1-2020.07.06.14.28. It allows remote attackers to bypass intended access restrictions or to cause a denial of service on dependent routing systems by strategically withholding RPKI Route Origin Authorisation ".roa" files or X509 Certificate Revocation List files from the RPKI relying party's view. NOTE: some third parties may regard this as a preferred behavior, not a vulnerability
The product does not validate, or incorrectly validates, a certificate.
Link | Tags |
---|---|
https://github.com/RIPE-NCC/rpki-validator-3/issues/232 | third party advisory issue tracking |
https://github.com/RIPE-NCC/rpki-validator-3/issues/158 | third party advisory issue tracking |
https://github.com/RIPE-NCC/rpki-validator-3/security/advisories/GHSA-q76j-58cx-wp5v | third party advisory |