CVE-2022-3616

Published at:
2022-10-28T07:15:16.557

Global infos:

Attackers can create long chains of CAs that would lead to OctoRPKI exceeding its max iterations parameter. In consequence it would cause the program to crash, preventing it from finishing the validation and leading to a denial of service. Credits to Donika Mirdita and Haya Shulman - Fraunhofer SIT, ATHENE, who discovered and reported this vulnerability.

CVE Status: Modified

References:

  • [email protected]
  • af854a3a-2127-422b-91ae-364da2661108
  • Metrics:

    AttributeValue
    Attack ComplexityHIGH
    Attack VectorNETWORK
    Availability ImpactHIGH
    Base Score5.4
    Base SeverityMEDIUM
    Confidentiality ImpactNONE
    Integrity ImpactLOW
    Privileges RequiredLOW
    ScopeUNCHANGED
    User InteractionREQUIRED
    Vector StringCVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H
    Exploitability Score1.2
    Impact Score4.2
    Source[email protected]
    TypeSecondary

    Links:

    Exploit-db
    Github