<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Bgp — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/bgp/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 07:16:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/bgp/feed.xml" rel="self" type="application/rss+xml"/><item><title>osrg GoBGP Integer Underflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-gobgp-integer-underflow/</link><pubDate>Mon, 04 May 2026 07:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gobgp-integer-underflow/</guid><description>osrg GoBGP up to version 4.3.0 is vulnerable to an integer underflow in the parseRibEntry function, potentially allowing a remote attacker to cause a denial of service or other unspecified impacts; version 4.4.0 addresses this issue.</description><content:encoded><![CDATA[<p>A vulnerability exists in osrg GoBGP, specifically in versions up to 4.3.0. The flaw is located within the <code>parseRibEntry</code> function of the <code>pkg/packet/mrt/mrt.go</code> file. This integer underflow vulnerability, identified as CVE-2026-7736, can be triggered remotely by an attacker who sends malicious or unexpected data to the affected function. Successful exploitation could lead to a denial-of-service condition or other unspecified consequences. Users are advised to upgrade to version 4.4.0, which contains the patch identified as 76d911046344a3923cbe573364197aa081944592, to mitigate the risk. The vulnerability poses a risk to network infrastructure relying on the BGP protocol, potentially impacting routing stability and availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable GoBGP instance running a version prior to 4.4.0.</li>
<li>The attacker crafts a malicious MRT (Multi-Threaded Routing Toolkit) message.</li>
<li>The attacker sends the crafted MRT message to the vulnerable GoBGP instance. This is typically done over a TCP connection to the BGP port (179).</li>
<li>The <code>parseRibEntry</code> function processes the malicious MRT message.</li>
<li>Due to the integer underflow vulnerability, the <code>parseRibEntry</code> function calculates an incorrect value.</li>
<li>This incorrect value leads to unexpected behavior such as a crash or resource exhaustion.</li>
<li>The GoBGP process becomes unstable or terminates.</li>
<li>This disrupts BGP routing, potentially leading to a denial-of-service condition for network services that rely on BGP.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could allow a remote attacker to disrupt BGP routing, leading to a denial-of-service condition. The precise impact will depend on the specific network configuration and the role of the affected GoBGP instance. Systems relying on the BGP protocol for routing information could experience connectivity issues or routing instability. While the number of affected deployments is unknown, any organization utilizing GoBGP in their network infrastructure is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to GoBGP version 4.4.0 or later to remediate the integer underflow vulnerability described in CVE-2026-7736.</li>
<li>Monitor network traffic for unexpected MRT messages being sent to GoBGP instances using the Sigma rule provided below.</li>
<li>Review and harden BGP configurations to limit exposure and potential attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve</category><category>vulnerability</category><category>integer underflow</category><category>bgp</category></item><item><title>GoBGP AIGP Attribute Parser Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-gobgp-buffer-overflow/</link><pubDate>Mon, 04 May 2026 06:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gobgp-buffer-overflow/</guid><description>A remote buffer overflow vulnerability exists in osrg GoBGP up to version 4.3.0 within the PathAttributeAigp.DecodeFromBytes function, allowing attackers to potentially execute arbitrary code by manipulating the AIGP Attribute Parser.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability has been identified in the osrg GoBGP software, specifically affecting versions up to 4.3.0. The vulnerability resides in the <code>PathAttributeAigp.DecodeFromBytes</code> function of the <code>pkg/packet/bgp/bgp.go</code> file, which is part of the AIGP Attribute Parser component. An attacker can remotely trigger this vulnerability by sending a crafted BGP message containing a malicious AIGP attribute. Successful exploitation could lead to arbitrary code execution on the affected system. GoBGP is an open source BGP implementation. Organizations using GoBGP for routing purposes should upgrade to version 4.4.0 or apply the provided patch (51ad1ada06cb41ce47b7066799981816f50b7ced) to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a GoBGP instance running a vulnerable version (&lt;= 4.3.0).</li>
<li>Attacker crafts a malicious BGP update message containing a specially crafted AIGP attribute.</li>
<li>The crafted AIGP attribute is designed to trigger a buffer overflow in the <code>PathAttributeAigp.DecodeFromBytes</code> function.</li>
<li>The attacker sends the malicious BGP update message to the vulnerable GoBGP instance over TCP port 179.</li>
<li>The GoBGP instance receives the message and attempts to parse the AIGP attribute using the vulnerable function.</li>
<li>The <code>PathAttributeAigp.DecodeFromBytes</code> function fails to properly validate the size of the input data, leading to a buffer overflow.</li>
<li>The buffer overflow overwrites adjacent memory regions, potentially including critical program data or executable code.</li>
<li>The attacker leverages the memory corruption to execute arbitrary code on the GoBGP instance, gaining control of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected GoBGP instance. This can lead to a complete compromise of the routing infrastructure, allowing the attacker to intercept, modify, or disrupt network traffic. In service provider environments, this could affect a large number of customers and cause significant network outages. Given the CVSS v3.1 score of 7.3, this is considered a high-severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to GoBGP version 4.4.0 to remediate the vulnerability as mentioned in the overview.</li>
<li>Apply the patch <code>51ad1ada06cb41ce47b7066799981816f50b7ced</code> to the affected component to mitigate the vulnerability if upgrading is not immediately possible.</li>
<li>Monitor network traffic for BGP update messages with unusually large or malformed AIGP attributes, using a network intrusion detection system.</li>
<li>Deploy the Sigma rule detecting connections to port 179 from unusual sources to identify potentially malicious hosts attempting to exploit the vulnerability.</li>
<li>Review and harden BGP configuration to limit accepted peer connections to trusted sources only.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-7735</category><category>buffer-overflow</category><category>bgp</category></item><item><title>Juniper Junos OS and Junos OS Evolved BGP Session Reset Denial of Service (CVE-2026-33797)</title><link>https://feed.craftedsignal.io/briefs/2024-01-22-juniper-bgp-dos/</link><pubDate>Thu, 09 Apr 2026 22:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-22-juniper-bgp-dos/</guid><description>CVE-2026-33797 is an improper input validation vulnerability in Juniper Networks Junos OS and Junos OS Evolved that allows an unauthenticated adjacent attacker to reset established BGP sessions via a specific BGP packet, leading to a denial of service condition.</description><content:encoded><![CDATA[<p>CVE-2026-33797 is a vulnerability affecting Juniper Networks Junos OS and Junos OS Evolved versions 25.2 before 25.2R2 and 25.2-EVO before 25.2R2-EVO, respectively. It stems from improper input validation within the Border Gateway Protocol (BGP) handling. An unauthenticated, adjacent attacker can exploit this flaw by sending a crafted BGP packet to an already established BGP session. This malicious packet causes the targeted BGP session to reset, leading to a Denial of Service (DoS). Repeated transmission of the crafted packet can sustain the DoS condition. Both external BGP (eBGP) and internal BGP (iBGP) sessions are susceptible, and the vulnerability impacts both IPv4 and IPv6 network configurations. This vulnerability poses a risk to network stability and availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Juniper device running Junos OS or Junos OS Evolved versions 25.2 prior to 25.2R2 or 25.2-EVO prior to 25.2R2-EVO.</li>
<li>The attacker establishes network adjacency to the targeted device, allowing for direct BGP communication.</li>
<li>The attacker crafts a specific, but genuine, BGP packet designed to exploit the improper input validation vulnerability.</li>
<li>The attacker sends the crafted BGP packet to an already established BGP session on the target device.</li>
<li>Upon receiving the malicious packet, the vulnerable Junos OS or Junos OS Evolved instance improperly processes it.</li>
<li>Due to the input validation failure, the targeted BGP session is forcibly reset.</li>
<li>The attacker repeats the process of sending the crafted BGP packet to continuously reset the BGP session.</li>
<li>The repeated session resets cause a sustained Denial of Service (DoS), disrupting network routing and connectivity.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33797 leads to a denial-of-service condition affecting BGP routing. By repeatedly sending crafted BGP packets, an attacker can disrupt network connectivity and stability. The impact is a loss of routing functionality for networks relying on the targeted BGP sessions. The number of potential victims is broad, including any organization using vulnerable versions of Junos OS or Junos OS Evolved. This can result in service outages, impaired communication, and potential financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Junos OS to version 25.2R2 or later to remediate CVE-2026-33797 (see references).</li>
<li>Upgrade Junos OS Evolved to version 25.2R2-EVO or later to remediate CVE-2026-33797 (see references).</li>
<li>Deploy the Sigma rule provided to detect unusual BGP reset activity in network traffic (see rules).</li>
<li>Monitor network traffic for unexpected BGP session resets originating from adjacent networks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-33797</category><category>denial-of-service</category><category>juniper</category><category>bgp</category><category>network</category></item><item><title>GoBGP Remote Denial of Service via Malformed BGP UPDATE Message</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-gobgp-dos/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-gobgp-dos/</guid><description>A remote Denial of Service (DoS) vulnerability exists in GoBGP version 4.2.0 and earlier, where a malformed BGP UPDATE message can trigger a runtime error (index out of range panic), crashing the GoBGP process. This occurs during the processing of 4-byte AS attributes when the message structure causes an internal slice index shift that is not properly handled. A single malicious peer or a malformed route propagated through a transit provider can consistently crash the BGP daemon, leading to a complete loss of routing capabilities.</description><content:encoded><![CDATA[<p>A remote Denial of Service vulnerability exists in GoBGP that can be triggered by a malformed BGP UPDATE message, specifically when handling 4-byte AS attributes. The vulnerability, identified as CVE-2026-41643, affects GoBGP version 4.2.0 and earlier. The attack involves sending a crafted BGP UPDATE message that causes an index-out-of-range panic in the <code>UpdatePathAttrs4ByteAs</code> function within <code>internal/pkg/table/message.go</code>. This panic results in the GoBGP process crashing, leading to a loss of routing capabilities. A malicious peer or a malformed route propagated through a transit provider can exploit this vulnerability to consistently crash the BGP daemon. This can disrupt network operations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker establishes a BGP peering session with a vulnerable GoBGP instance (version 4.2.0 or earlier).</li>
<li>The attacker crafts a malicious BGP UPDATE message. This message contains both an AS_PATH (Type 2) and an AS4_PATH (Type 17) attribute.</li>
<li>The crafted message orders the attributes such that the AS4_PATH appears before the AS_PATH.</li>
<li>The AS4_PATH attribute is intentionally malformed to trigger a validation error.</li>
<li>The GoBGP process attempts to remove the invalid AS4_PATH attribute from the <code>msg.PathAttributes</code> slice in the <code>UpdatePathAttrs4ByteAs</code> function.</li>
<li>Removing the AS4_PATH causes subsequent attributes in the slice to shift left, altering their indices.</li>
<li>The function attempts to access the AS_PATH attribute using a stale index (asAttrPos) calculated before the slice modification.</li>
<li>Due to the index shift, accessing <code>msg.PathAttributes[asAttrPos]</code> results in an out-of-bounds access, triggering a panic and crashing the GoBGP process, causing a denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The vulnerability leads to a remote Denial of Service (DoS) condition. Any GoBGP deployment (v4.2.0 and earlier) that accepts BGP UPDATE messages from peers is vulnerable. A single malicious peer or a malformed route propagated through a transit provider can consistently crash the BGP daemon. This results in a complete loss of routing capabilities, disrupting network services, and causing potential outages.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade GoBGP to a patched version that addresses CVE-2026-41643.</li>
<li>Monitor BGP UPDATE messages for malformed AS4_PATH attributes (Type 17) appearing before AS_PATH attributes (Type 2) using a network intrusion detection system.</li>
<li>Implement rate limiting on BGP UPDATE messages from untrusted peers to mitigate the impact of a DoS attack.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial of service</category><category>bgp</category><category>network</category></item><item><title>GoBGP Remote Denial of Service via Malformed BGP Update Message</title><link>https://feed.craftedsignal.io/briefs/2024-01-gobgp-dos/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-gobgp-dos/</guid><description>A denial-of-service vulnerability exists in GoBGP version 4.3.0 where a malformed BGP UPDATE message containing an unrecognized Well-known Path Attribute triggers a nil pointer dereference, causing the BGP daemon to crash.</description><content:encoded><![CDATA[<p>GoBGP version 4.3.0 is susceptible to a denial-of-service (DoS) vulnerability triggered by malformed BGP UPDATE messages. Specifically, when GoBGP receives an UPDATE message containing an unrecognized Path Attribute marked as &ldquo;Well-known&rdquo; (Optional bit set to 0), the daemon fails to properly handle the error. This leads to a nil pointer dereference, resulting in a panic and subsequent crash of the entire GoBGP process. This vulnerability, disclosed in GHSA-7235-89m6-f4px, can be exploited by any BGP peer, internal or external, sending such a malformed message. This poses a significant risk to network stability as it can disrupt BGP routing and connectivity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker establishes a standard BGP session with the targeted GoBGP instance, completing the OPEN/KEEPALIVE exchange.</li>
<li>The attacker crafts a malicious BGP UPDATE message.</li>
<li>This UPDATE message includes a Path Attribute with the Optional bit set to 0 (Well-known).</li>
<li>The Path Attribute Type Code is set to an unrecognized value (e.g., 0xEE or 0xFF).</li>
<li>The parsing logic in GoBGP identifies the unrecognized Well-known attribute.</li>
<li>The <code>recvMessageloop</code> function in <code>pkg/server/fsm.go</code> fails to halt execution after identifying the malformed attribute.</li>
<li>The code attempts to dereference a nil pointer associated with the invalid message body.</li>
<li>This results in a &ldquo;panic: runtime error: invalid memory address or nil pointer dereference&rdquo;, causing the GoBGP daemon to crash, disrupting BGP routing.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The vulnerability allows a remote attacker to cause a denial-of-service condition on GoBGP deployments. A single malformed UPDATE message is sufficient to trigger the crash, affecting all GoBGP instances peering with potentially malicious or compromised BGP speakers. This can lead to routing instability, network outages, and potential data plane disruptions. The affected version, 4.3.0, may be widely deployed in various network environments, making it a significant concern for network operators.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect GoBGP Malformed BGP Update</code> to identify crafted BGP UPDATE messages containing unrecognized Well-known Path Attributes via network traffic analysis.</li>
<li>Monitor BGP peer sessions for unexpected disconnects or restarts, which may indicate exploitation of this vulnerability.</li>
<li>Consider implementing BGP route filtering and validation mechanisms to mitigate the impact of malformed or malicious UPDATE messages.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>gobgp</category><category>dos</category><category>bgp</category><category>routing</category></item></channel></rss>