{"api_version":"1","generated_at":"2026-04-23T16:56:11+00:00","cve":"CVE-2023-39915","urls":{"html":"https://cve.report/CVE-2023-39915","api":"https://cve.report/api/cve/CVE-2023-39915.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-39915","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-39915"},"summary":{"title":"CVE-2023-39915","description":"NLnet Labs’ Routinator up to and including version 0.12.1 may crash when trying to parse certain malformed RPKI objects. This is due to insufficient input checking in the bcder library covered by CVE-2023-39914.","state":"PUBLIC","assigner":"sep@nlnetlabs.nl","published_at":"2023-09-13 15:15:00","updated_at":"2023-09-15 19:04:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://nlnetlabs.nl/downloads/routinator/CVE-2023-39915.txt","name":"https://nlnetlabs.nl/downloads/routinator/CVE-2023-39915.txt","refsource":"MISC","tags":[],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-39915","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39915","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"39915","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nlnetlabs","cpe5":"routinator","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-39915","qid":"691301","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for routinator (11982747-544c-11ee-ac3e-a04a5edf46d9)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-39915","ASSIGNER":"sep@nlnetlabs.nl","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"NLnet Labs’ Routinator up to and including version 0.12.1 may crash when trying to parse certain malformed RPKI objects. This is due to insufficient input checking in the bcder library covered by CVE-2023-39914."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-228: Improper Handling of Syntactically Invalid Structure","cweId":"CWE-228"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"NLnet Labs","product":{"product_data":[{"product_name":"Routinator","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"versions":[{"version":"*","status":"affected","lessThan":"0.12.2","versionType":"semver"},{"version":"0.12.2","status":"unaffected","lessThan":"*","versionType":"semver"}],"defaultStatus":"unaffected"}}]}}]}}]}},"references":{"reference_data":[{"url":"https://nlnetlabs.nl/downloads/routinator/CVE-2023-39915.txt","refsource":"MISC","name":"https://nlnetlabs.nl/downloads/routinator/CVE-2023-39915.txt"}]},"solution":[{"lang":"en","value":"This issue is fixed in 0.12.2 and all later versions."}],"credits":[{"lang":"en","value":"Haya Shulman"},{"lang":"en","value":"Donika Mirdita"},{"lang":"en","value":"Niklas Vogel"}],"impact":{"cvss":[{"version":"3.1","baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}},"nvd":{"publishedDate":"2023-09-13 15:15:00","lastModifiedDate":"2023-09-15 19:04:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nlnetlabs:routinator:*:*:*:*:*:*:*:*","versionEndExcluding":"0.12.2","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}