Vulnerability Details CVE-2021-41531
NLnet Labs Routinator prior to 0.10.0 produces invalid RTR payload if an RPKI CA uses too large values in the max-length parameter in a ROA. This will lead to RTR clients such as routers to reject the RPKI data set, effectively disabling Route Origin Validation.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 56.7%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2021-41531
-
cpe:2.3:a:nlnetlabs:routinator:-
-
cpe:2.3:a:nlnetlabs:routinator:0.1.0
-
cpe:2.3:a:nlnetlabs:routinator:0.1.1
-
cpe:2.3:a:nlnetlabs:routinator:0.1.2
-
cpe:2.3:a:nlnetlabs:routinator:0.2.0
-
cpe:2.3:a:nlnetlabs:routinator:0.2.1
-
cpe:2.3:a:nlnetlabs:routinator:0.3.0
-
cpe:2.3:a:nlnetlabs:routinator:0.3.1
-
cpe:2.3:a:nlnetlabs:routinator:0.3.2
-
cpe:2.3:a:nlnetlabs:routinator:0.3.3
-
cpe:2.3:a:nlnetlabs:routinator:0.4.0
-
cpe:2.3:a:nlnetlabs:routinator:0.5.0
-
cpe:2.3:a:nlnetlabs:routinator:0.6.0
-
cpe:2.3:a:nlnetlabs:routinator:0.6.1
-
cpe:2.3:a:nlnetlabs:routinator:0.6.2
-
cpe:2.3:a:nlnetlabs:routinator:0.6.3
-
cpe:2.3:a:nlnetlabs:routinator:0.6.4
-
cpe:2.3:a:nlnetlabs:routinator:0.7.0
-
cpe:2.3:a:nlnetlabs:routinator:0.7.1
-
cpe:2.3:a:nlnetlabs:routinator:0.8.0
-
cpe:2.3:a:nlnetlabs:routinator:0.8.1
-
cpe:2.3:a:nlnetlabs:routinator:0.8.2
-
cpe:2.3:a:nlnetlabs:routinator:0.8.3
-
cpe:2.3:a:nlnetlabs:routinator:0.9.0