First published: Wed Aug 05 2020(Updated: )
An issue was discovered in NLnet Labs Routinator 0.1.0 through 0.7.1. It allows remote attackers to bypass intended access restrictions or to cause a denial of service on dependent routing systems by strategically withholding RPKI Route Origin Authorisation ".roa" files or X509 Certificate Revocation List files from the RPKI relying party's view.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nlnetlabs Routinator | >=0.1.0<=0.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-17366 is high with a CVSS score of 7.4.
NLnet Labs Routinator versions 0.1.0 through 0.7.1 are affected by CVE-2020-17366.
A remote attacker can exploit CVE-2020-17366 by strategically withholding RPKI Route Origin Authorisation ".roa" files or X509 Certificate Revocation files, thereby bypassing intended access restrictions or causing a denial of service on dependent routing systems.
You can find more information about CVE-2020-17366 on the following references: [link1](https://github.com/NLnetLabs/routinator/issues/319) and [link2](https://github.com/NLnetLabs/routinator/releases/tag/v0.8.0).
To fix CVE-2020-17366, it is recommended to upgrade to NLnet Labs Routinator version 0.8.0 or later.