CVE-2021-43172 allows a malicious CA to create an infinite length chain of CAs in Routinator, leading to denial of service. Learn about the impact, affected systems, and mitigation steps.
NLnet Labs Routinator prior to 0.10.2 happily processes a chain of RRDP repositories of infinite length causing it to never finish a validation run, allowing for an uncontrolled recursion vulnerability.
Understanding CVE-2021-43172
This CVE describes a vulnerability in Routinator that can be exploited by a malicious CA to create a chain of CAs with infinite length, leading to denial of service.
What is CVE-2021-43172?
CVE-2021-43172 is a vulnerability in NLnet Labs Routinator prior to version 0.10.2 that allows a malicious certification authority (CA) to create a chain of CAs with an infinite length. This results in a denial-of-service condition where the validation run never finishes.
The Impact of CVE-2021-43172
The vulnerability allows an attacker to continuously generate child CAs with different RRDP repositories, causing Routinator to process the chain indefinitely. This results in Routinator serving outdated data or no data at all, impacting the RPKI validation process.
Technical Details of CVE-2021-43172
This section provides insight into the vulnerability specifics.
Vulnerability Description
Routinator prior to version 0.10.2 lacks a limit on the length of RRDP repository chains created by a malicious CA, leading to an infinite loop and denial of service.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Protecting systems from CVE-2021-43172 requires immediate action and long-term security measures.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates