Attackers can create long chains of CAs that would lead to OctoRPKI exceeding its max iterations parameter. In consequence it would cause the program to crash, preventing it from finishing the validation and leading to a denial of service. Credits to Donika Mirdita and Haya Shulman - Fraunhofer SIT, ATHENE, who discovered and reported this vulnerability.
History

Mon, 05 May 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cloudflare

Published: 2022-10-28T06:24:44.189Z

Updated: 2025-05-05T19:19:50.911Z

Reserved: 2022-10-20T11:13:34.797Z

Link: CVE-2022-3616

cve-icon Vulnrichment

Updated: 2024-08-03T01:14:03.299Z

cve-icon NVD

Status : Modified

Published: 2022-10-28T07:15:16.557

Modified: 2024-11-21T07:19:53.173

Link: CVE-2022-3616

cve-icon Redhat

No data.