Vulnerability Details : CVE-2023-39915
NLnet Labs' Routinator up to and including version 0.12.1 may crash when trying to parse certain malformed RPKI objects. This is due to insufficient input checking in the bcder library covered by CVE-2023-39914.
Products affected by CVE-2023-39915
- cpe:2.3:a:nlnetlabs:routinator:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-39915
0.35%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 56 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-39915
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NLnet Labs |
CWE ids for CVE-2023-39915
-
The product does not handle or incorrectly handles input that is not syntactically well-formed with respect to the associated specification.Assigned by: sep@nlnetlabs.nl (Secondary)
-
The product does not handle or incorrectly handles when a value is not defined or supported for the associated parameter, field, or argument name.Assigned by: sep@nlnetlabs.nl (Secondary)
-
The product does not handle or incorrectly handles when two or more structural elements should be consistent, but are not.Assigned by: sep@nlnetlabs.nl (Secondary)
References for CVE-2023-39915
-
https://nlnetlabs.nl/downloads/routinator/CVE-2023-39915.txt
Vendor Advisory
Jump to