First published: Sat Aug 24 2024(Updated: )
An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing an Authority Key Identifier extension that lacks the keyIdentifier field. Fort references this pointer without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiGate | <1.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45235 has been identified as a critical vulnerability affecting Fort versions before 1.6.3.
To fix CVE-2024-45235, upgrade Fort software to version 1.6.3 or later.
CVE-2024-45235 allows attackers to exploit a malicious RPKI repository to serve invalid resource certificates.
Any users or organizations utilizing Fort software versions before 1.6.3 are affected by CVE-2024-45235.
The vulnerability in CVE-2024-45235 specifically affects the handling of Authority Key Identifier extensions within resource certificates.