<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>FRR — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/frr/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 07:13:46 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/frr/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-37459: FRRouting BGP UPDATE Message Integer Underflow DoS</title><link>https://feed.craftedsignal.io/briefs/2026-05-frr-bgp-dos/</link><pubDate>Tue, 19 May 2026 07:13:46 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-frr-bgp-dos/</guid><description>An integer underflow vulnerability, CVE-2026-37459, in FRRouting (FRR) versions stable/10.0 to stable/10.6 allows a remote attacker to cause a Denial of Service (DoS) by sending a crafted BGP UPDATE message.</description><content:encoded><![CDATA[<p>CVE-2026-37459 is an integer underflow vulnerability affecting FRRouting (FRR), a widely used IP routing protocol suite for Linux and Unix platforms. The vulnerability resides in the BGP (Border Gateway Protocol) UPDATE message processing logic within FRR versions stable/10.0 to stable/10.6. A remote attacker can exploit this flaw by sending a specially crafted BGP UPDATE message to a vulnerable FRR instance, triggering an integer underflow. This underflow condition can lead to memory corruption or other unexpected behavior, ultimately causing the FRR process to crash and resulting in a Denial of Service (DoS) condition. This vulnerability poses a risk to network availability, as it can disrupt routing operations and impact network connectivity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable FRR instance running a version between stable/10.0 and stable/10.6.</li>
<li>Attacker crafts a malicious BGP UPDATE message designed to trigger the integer underflow. The specific details of the message structure are not available in the provided source.</li>
<li>Attacker sends the crafted BGP UPDATE message to the vulnerable FRR instance over TCP port 179, the standard BGP port.</li>
<li>The FRR instance receives the BGP UPDATE message and begins processing it.</li>
<li>During the processing of the BGP UPDATE message, the integer underflow occurs due to a calculation error.</li>
<li>The integer underflow leads to memory corruption within the FRR process.</li>
<li>The memory corruption causes the FRR process to crash.</li>
<li>The crash of the FRR process results in a Denial of Service (DoS), disrupting routing operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-37459 can lead to a Denial of Service (DoS) condition, impacting the availability of network routing services. While the exact number of affected organizations is unknown, FRR is used in a variety of network environments, including enterprise networks, service provider networks, and research networks. A successful attack could disrupt routing operations, leading to network outages, service disruptions, and potential financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade FRRouting (FRR) to a patched version beyond stable/10.6 to remediate CVE-2026-37459.</li>
<li>Monitor network traffic for suspicious BGP UPDATE messages that may indicate exploitation attempts using the &ldquo;Detect Suspicious BGP UPDATE Messages&rdquo; Sigma rule.</li>
<li>Implement rate limiting for BGP UPDATE messages to mitigate the impact of a DoS attack.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>bgp</category><category>dos</category><category>frrouting</category><category>network</category></item></channel></rss>