Impact
A crafted BGP UPDATE message with incorrect attribute lengths causes GoBGP, an open‐source BGP implementation, to panic inside AdjRib.Update. The resulting nil pointer dereference makes the entire GoBGP process crash. This error manifests as a complete loss of service availability for the affected router. The flaw is a classic null pointer dereference (CWE‑476).
Affected Systems
The vulnerability affects Open Source Routing Group’s GoBGP 4.4.0. Versions 4.5.0 and newer contain the fix. No other releases are known to be impacted.
Risk and Exploitability
The flaw is exploitable by any unauthenticated remote BGP peer. A CVSS score of 7.5 indicates high severity, and the EPSS score is not yet available, so detection of attacks is uncertain. The vulnerability is not listed in the CISA KEV catalog, but its high availability impact warrants urgent attention. Attackers would simply send a malicious UPDATE to trigger a crash without needing prior authentication or special privileges.
OpenCVE Enrichment
Github GHSA