CVE-2022-3616

Attackers can create long chains of CAs that would lead to OctoRPKI exceeding its max iterations parameter. In consequence it would cause the program to crash, preventing it from finishing the validation and leading to a denial of service. Credits toDonika Mirdita andHaya Shulman - Fraunhofer SIT, ATHENE, who discovered and reported this vulnerability.

ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.4 MEDIUM
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H
cloudflareCNA
5.4 MEDIUM
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 21%
VendorProductVersion
cloudflareoctorpki
𝑥
< 1.4.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
cfrpki
bullseye (security)
vulnerable
bullseye
no-dsa
bookworm
1.4.4-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
cfrpki
noble
dne
mantic
not-affected
lunar
ignored
kinetic
ignored
jammy
needs-triage
focal
dne
bionic
dne
xenial
ignored
trusty
ignored