<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>FRR Stable/10.1 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/frr-stable/10.1/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 07:13:08 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/frr-stable/10.1/feed.xml" rel="self" type="application/rss+xml"/><item><title>FRRouting CVE-2026-37458 Denial of Service Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-frrouting-dos/</link><pubDate>Tue, 19 May 2026 07:13:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-frrouting-dos/</guid><description>A denial-of-service vulnerability, identified as CVE-2026-37458, exists in the MP_REACH_NLRI component of FRRouting versions stable/10.0 to stable/10.6, where authenticated attackers can trigger a DoS by sending a crafted UPDATE message due to missing input validation.</description><content:encoded><![CDATA[<p>FRRouting (FRR) is susceptible to a denial-of-service (DoS) vulnerability, tracked as CVE-2026-37458, affecting versions stable/10.0 through stable/10.6. The vulnerability lies within the MP_REACH_NLRI component and stems from a lack of input validation when processing UPDATE messages. An authenticated attacker can exploit this flaw by sending a specially crafted UPDATE message, leading to resource exhaustion or service interruption on the affected FRR instance. Successful exploitation can disrupt network routing and availability. Defenders should apply the appropriate patches or mitigations to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated attacker gains network access to an FRR instance running a vulnerable version (stable/10.0 to stable/10.6).</li>
<li>The attacker crafts a malicious BGP UPDATE message specifically targeting the MP_REACH_NLRI component.</li>
<li>This crafted UPDATE message contains invalid or oversized data within the NLRI (Network Layer Reachability Information) fields.</li>
<li>The attacker sends the crafted UPDATE message to the targeted FRR instance.</li>
<li>The FRR instance receives the crafted UPDATE message and attempts to process the malformed NLRI data.</li>
<li>Due to the missing input validation, the FRR instance consumes excessive resources (CPU, memory) while processing the invalid NLRI.</li>
<li>The resource exhaustion leads to a denial of service, impacting the routing functionality of the FRR instance.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-37458 results in a denial-of-service condition, preventing the FRRouting instance from properly functioning. This can disrupt network routing, leading to connectivity issues and potential network outages. The impact is primarily a loss of availability for network services relying on the affected FRR instance. The number of potential victims depends on the deployment size of FRRouting within an organization&rsquo;s network infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade FRRouting instances to a patched version beyond stable/10.6 to remediate CVE-2026-37458.</li>
<li>Deploy the Sigma rule &ldquo;Detect CVE-2026-37458 Exploitation Attempt - Malformed BGP UPDATE Message&rdquo; to identify suspicious BGP UPDATE messages indicative of exploitation attempts.</li>
<li>Implement rate limiting for BGP UPDATE messages to mitigate the impact of potential DoS attacks.</li>
<li>Monitor network traffic for unusual patterns related to BGP UPDATE messages.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>denial-of-service</category><category>network</category><category>frrouting</category><category>cve-2026-37458</category></item></channel></rss>