Discover the impact and mitigation strategies for CVE-2021-43173, a vulnerability in Routinator by NLnet Labs. Learn how to prevent validation stalls and protect your systems.
In NLnet Labs Routinator prior to 0.10.2, a validation run can be delayed significantly by an RRDP repository by not answering but slowly drip-feeding bytes to keep the connection alive. This can be used to effectively stall validation. Learn about the impact, technical details, and mitigation strategies below.
Understanding CVE-2021-43173
CVE-2021-43173, also known as 'Hanging RRDP request,' poses a risk related to how Routinator handles RRDP connections.
What is CVE-2021-43173?
CVE-2021-43173 describes a vulnerability in Routinator that can result in the stalling of validation due to a delay caused by an RRDP repository. This delay can lead to outdated data being served or no data being served at all.
The Impact of CVE-2021-43173
The vulnerability allows malicious RRDP repositories to prolong the validation process, potentially causing a denial of service or serving outdated information due to stalled validation by Routinator.
Technical Details of CVE-2021-43173
Routinator's vulnerability to hanging RRDP requests is caused by improper handling of stalled connections.
Vulnerability Description
The issue stems from Routinator's timeout mechanism, which is not effectively applied to the complete request, allowing malicious RRDP repositories to extend the validation time by continuously feeding small amounts of data.
Affected Systems and Versions
Exploitation Mechanism
Malicious RRDP repositories exploit Routinator's timeout configuration by drip-feeding minimal data to extend the validation duration, leading to validation stalls.
Mitigation and Prevention
To address CVE-2021-43173, follow these steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Apply security patches provided by NLnet Labs promptly to ensure protection against CVE-2021-43173.