Impact
A flaw in the EVPN Type-2 Route Handler of FRRouting FRR, affecting releases up to 10.5.1, allows remote actors to manipulate the process_type2_route function in bgpd/bgp_evpn.c. The manipulation bypasses established access controls, enabling unauthorized changes to EVPN routing tables. While exploitation requires a high level of complexity and is reported as difficult, the vector is remote, suggesting that an attacker could potentially introduce incorrect routes or disrupt network traffic if successful.
Affected Systems
The affected product is FRRouting FRR, specifically versions up to 10.5.1. No other vendors or products are listed, and the flaw is limited to the EVPN Type-2 Route handling component.
Risk and Exploitability
The CVSS score of 2.3 indicates low severity, and the EPSS score of less than 1 percent signals a very small probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Although the attack is considered difficult and requires high complexity, the remote attack vector implies that a threat actor with sufficient skill could exploit the flaw. Based on the description, it is inferred that successful exploitation could allow an attacker to manipulate EVPN Type-2 routes, potentially altering routing decisions on the target. Because the exploit relies on a specific remote function in bgp_evpn.c, automated attacks would be challenging, but targeted attackers may still find value in compromising the host.
OpenCVE Enrichment