CVE-2020-17366
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
An issue was discovered in NLnet Labs Routinator 0.1.0 through 0.7.1. It allows remote attackers to bypass intended access restrictions or to cause a denial of service on dependent routing systems by strategically withholding RPKI Route Origin Authorisation ".roa" files or X509 Certificate Revocation List files from the RPKI relying party's view.
Se detectó un problema en NLnet Labs Routinator versiones 0.1.0 hasta 0.7.1. Permite a atacantes remotos omitir las restricciones de acceso previstas o causar una denegación de servicio en los sistemas de enrutamiento dependientes al retener estratégicamente los archivos ".roa" Route Origin Authorisation de RPKI o los archivos de la Lista de Revocación de Certificados X509 desde la vista de la parte que confía en RPKI
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-08-05 CVE Reserved
- 2020-08-05 CVE Published
- 2023-05-08 EPSS Updated
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-295: Improper Certificate Validation
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://github.com/NLnetLabs/routinator/releases/tag/v0.8.0 | Release Notes |
URL | Date | SRC |
---|---|---|
https://github.com/NLnetLabs/routinator/issues/319 | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Nlnetlabs Search vendor "Nlnetlabs" | Routinator Search vendor "Nlnetlabs" for product "Routinator" | >= 0.1.0 <= 0.7.1 Search vendor "Nlnetlabs" for product "Routinator" and version " >= 0.1.0 <= 0.7.1" | - |
Affected
|