{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-3616","assignerOrgId":"a22f1246-ba21-4bb4-a601-ad51614c1513","state":"PUBLISHED","assignerShortName":"cloudflare","requesterUserId":"25b7b156-39bf-4f6b-8c25-8bc69c5c5e82","dateReserved":"2022-10-20T11:13:34.797Z","datePublished":"2022-10-28T06:24:44.189Z","dateUpdated":"2025-05-05T19:19:50.911Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["Go"],"product":"OctoRPKI","repo":"https://github.com/cloudflare/cfrpki","vendor":"Cloudflare","versions":[{"lessThan":"<1.4.4","status":"affected","version":"0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"reporter","user":"00000000-0000-4000-9000-000000000000","value":"Donika Mirdita - Fraunhofer SIT, ATHENE "},{"lang":"en","type":"reporter","user":"00000000-0000-4000-9000-000000000000","value":"Haya Shulman - Fraunhofer SIT, ATHENE"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<table><tbody><tr><td>Attackers can create long chains of CAs that would lead to OctoRPKI exceeding its max iterations parameter. In consequence it would cause the program to crash, preventing it from finishing the validation and leading to a denial of service. Credits to&nbsp;Donika Mirdita and&nbsp;Haya Shulman - Fraunhofer SIT, ATHENE, who discovered and reported this vulnerability.</td></tr></tbody></table><br><br>"}],"value":"Attackers can create long chains of CAs that would lead to OctoRPKI exceeding its max iterations parameter. In consequence it would cause the program to crash, preventing it from finishing the validation and leading to a denial of service. Credits to Donika Mirdita and Haya Shulman - Fraunhofer SIT, ATHENE, who discovered and reported this vulnerability.\n\n"}],"impacts":[{"capecId":"CAPEC-153","descriptions":[{"lang":"en","value":"CAPEC-153 Input Data Manipulation"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-754","description":"CWE-754 Improper Check for Unusual or Exceptional Conditions","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-834","description":"CWE-834 Excessive Iteration","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"a22f1246-ba21-4bb4-a601-ad51614c1513","shortName":"cloudflare","dateUpdated":"2023-03-29T08:43:36.139Z"},"references":[{"url":"https://github.com/cloudflare/cfrpki/security/advisories/GHSA-pmw9-567p-68pc"}],"source":{"advisory":"GHSA-pmw9-567p-68pc","discovery":"EXTERNAL"},"title":"OctoRPKI crash when maximum iterations number is reached","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:14:03.299Z"},"title":"CVE Program Container","references":[{"url":"https://github.com/cloudflare/cfrpki/security/advisories/GHSA-pmw9-567p-68pc","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-05T19:18:52.761100Z","id":"CVE-2022-3616","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-05T19:19:50.911Z"}}]}}