First published: Tue Sep 21 2021(Updated: )
NLnet Labs Routinator prior to 0.10.0 produces invalid RTR payload if an RPKI CA uses too large values in the max-length parameter in a ROA. This will lead to RTR clients such as routers to reject the RPKI data set, effectively disabling Route Origin Validation.
Credit: sep@nlnetlabs.nl sep@nlnetlabs.nl
Affected Software | Affected Version | How to fix |
---|---|---|
NLnet Labs Routinator | <0.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for NLnet Labs Routinator is CVE-2021-41531.
The severity of CVE-2021-41531 is high with a CVSS score of 7.5.
NLnet Labs Routinator prior to version 0.10.0 is affected by CVE-2021-41531.
CVE-2021-41531 can lead to the rejection of RPKI data sets by RTR clients, effectively disabling Route Origin Validation.
To fix CVE-2021-41531, you should update to version 0.10.0 or later of NLnet Labs Routinator.