Impact
The flaw resides in the EVPN Type‑2 Route Handler within FRRouting FRR. An attacker can manipulate routing data via process_type2_route, resulting in improper access controls. This vulnerability allows a remote actor to gain unauthorized access to routing configuration, potentially altering or injecting routes into the BGP EVPN table. The impact is a breach of confidentiality and integrity of routing information, which can affect network reachability and service availability.
Affected Systems
FRRouting’s FRR distribution, affected through all releases up to and including 10.5.1. No affected versions beyond 10.5.1 are listed, so newer releases should be verified for removal.
Risk and Exploitability
The CVSS score of 2.3 indicates low overall severity. Exploitability is considered difficult and the required attack complexity is high, with the attack vector being remote. No EPSS data or KEV listing is available, suggesting limited active exploitation. Nonetheless, administrators should treat the issue as an unauthorized access risk and apply the patch promptly.
OpenCVE Enrichment