CVE-2024-56170 Affecting fort-validator package, versions *


Severity

Recommended
medium

Based on Ubuntu security rating.

Threat Intelligence

EPSS
0.37% (59th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU2004-FORTVALIDATOR-8536616
  • published17 Jan 2026
  • disclosed18 Dec 2024

Introduced: 18 Dec 2024

CVE-2024-56170  (opens in a new tab)

How to fix?

There is no fixed version for Ubuntu:20.04 fort-validator.

NVD Description

Note: Versions mentioned in the description apply only to the upstream fort-validator package and not the fort-validator package as distributed by Ubuntu. See How to fix? for Ubuntu:20.04 relevant fixed versions and status.

A validation integrity issue was discovered in Fort through 1.6.4 before 2.0.0. RPKI manifests are listings of relevant files that clients are supposed to verify. Assuming everything else is correct, the most recent version of a manifest should be prioritized over other versions, to prevent replays, accidental or otherwise. Manifests contain the manifestNumber and thisUpdate fields, which can be used to gauge the relevance of a given manifest, when compared to other manifests. The former is a serial-like sequential number, and the latter is the date on which the manifest was created. However, the product does not compare the up-to-dateness of the most recently fetched manifest against the cached manifest. As such, it's prone to a rollback to a previous version if it's served a valid outdated manifest. This leads to outdated route origin validation.