Impact
The flaw lies in the GoBGP routing daemon’s DecodeFromBytes function, where manipulating the second byte of a BGP message can cause an off‑by‑one error during packet parsing. This mistake may lead to malformed packet handling and potentially disrupt routing logic, but no evidence of memory corruption or arbitrary code execution is provided.
Affected Systems
The vulnerability affects the osrg GoBGP project, specifically versions up to and including 4.3.0. The affected component is the DecodeFromBytes routine located in pkg/packet/bgp/bgp.go.
Risk and Exploitability
The CVSS score of 6.3 denotes moderate severity. The EPSS score is below 1 %, indicating a low probability of exploitation, and the flaw is not listed in the CISA KEV catalog. The attack vector is remote, requiring a crafted BGP packet from an external peer; however, the nature of the exploit is complex and the vulnerability is described as difficult to exploit in practice.
OpenCVE Enrichment