First published: Thu Sep 09 2021(Updated: )
Any CA issuer in the RPKI can trick OctoRPKI prior to 1.3.0 into emitting an invalid VRP "MaxLength" value, causing RTR sessions to terminate. An attacker can use this to disable RPKI Origin Validation in a victim network (for example AS 13335 - Cloudflare) prior to launching a BGP hijack which during normal operations would be rejected as "RPKI invalid". Additionally, in certain deployments RTR session flapping in and of itself also could cause BGP routing churn, causing availability issues.
Credit: cna@cloudflare.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/cfrpki | 1.4.2-1~deb11u1 1.4.4-1 1.5.10-2 | |
Cloudflare Octorpki | <1.3.0 | |
Debian Debian Linux | =11.0 |
Upgrade to 1.3.0
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3761 is a vulnerability in OctoRPKI prior to version 1.3.0 that allows any CA issuer in the RPKI to trick OctoRPKI into emitting an invalid VRP "MaxLength" value, causing RTR sessions to terminate.
CVE-2021-3761 can be used to disable RPKI Origin Validation in a victim network (for example AS 13335 - Cloudflare) prior to launching a BGP hijack.
CVE-2021-3761 has a severity rating of high, with a CVSS score of 7.5.
To fix CVE-2021-3761, update OctoRPKI to version 1.3.0 or later.
You can find more information about CVE-2021-3761 at the following references: [1] [2] [3]