<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Frrouting — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/frrouting/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 07:13:46 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/frrouting/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-37459: FRRouting BGP UPDATE Message Integer Underflow DoS</title><link>https://feed.craftedsignal.io/briefs/2026-05-frr-bgp-dos/</link><pubDate>Tue, 19 May 2026 07:13:46 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-frr-bgp-dos/</guid><description>An integer underflow vulnerability, CVE-2026-37459, in FRRouting (FRR) versions stable/10.0 to stable/10.6 allows a remote attacker to cause a Denial of Service (DoS) by sending a crafted BGP UPDATE message.</description><content:encoded><![CDATA[<p>CVE-2026-37459 is an integer underflow vulnerability affecting FRRouting (FRR), a widely used IP routing protocol suite for Linux and Unix platforms. The vulnerability resides in the BGP (Border Gateway Protocol) UPDATE message processing logic within FRR versions stable/10.0 to stable/10.6. A remote attacker can exploit this flaw by sending a specially crafted BGP UPDATE message to a vulnerable FRR instance, triggering an integer underflow. This underflow condition can lead to memory corruption or other unexpected behavior, ultimately causing the FRR process to crash and resulting in a Denial of Service (DoS) condition. This vulnerability poses a risk to network availability, as it can disrupt routing operations and impact network connectivity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable FRR instance running a version between stable/10.0 and stable/10.6.</li>
<li>Attacker crafts a malicious BGP UPDATE message designed to trigger the integer underflow. The specific details of the message structure are not available in the provided source.</li>
<li>Attacker sends the crafted BGP UPDATE message to the vulnerable FRR instance over TCP port 179, the standard BGP port.</li>
<li>The FRR instance receives the BGP UPDATE message and begins processing it.</li>
<li>During the processing of the BGP UPDATE message, the integer underflow occurs due to a calculation error.</li>
<li>The integer underflow leads to memory corruption within the FRR process.</li>
<li>The memory corruption causes the FRR process to crash.</li>
<li>The crash of the FRR process results in a Denial of Service (DoS), disrupting routing operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-37459 can lead to a Denial of Service (DoS) condition, impacting the availability of network routing services. While the exact number of affected organizations is unknown, FRR is used in a variety of network environments, including enterprise networks, service provider networks, and research networks. A successful attack could disrupt routing operations, leading to network outages, service disruptions, and potential financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade FRRouting (FRR) to a patched version beyond stable/10.6 to remediate CVE-2026-37459.</li>
<li>Monitor network traffic for suspicious BGP UPDATE messages that may indicate exploitation attempts using the &ldquo;Detect Suspicious BGP UPDATE Messages&rdquo; Sigma rule.</li>
<li>Implement rate limiting for BGP UPDATE messages to mitigate the impact of a DoS attack.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>bgp</category><category>dos</category><category>frrouting</category><category>network</category></item><item><title>FRRouting CVE-2026-37458 Denial of Service Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-frrouting-dos/</link><pubDate>Tue, 19 May 2026 07:13:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-frrouting-dos/</guid><description>A denial-of-service vulnerability, identified as CVE-2026-37458, exists in the MP_REACH_NLRI component of FRRouting versions stable/10.0 to stable/10.6, where authenticated attackers can trigger a DoS by sending a crafted UPDATE message due to missing input validation.</description><content:encoded><![CDATA[<p>FRRouting (FRR) is susceptible to a denial-of-service (DoS) vulnerability, tracked as CVE-2026-37458, affecting versions stable/10.0 through stable/10.6. The vulnerability lies within the MP_REACH_NLRI component and stems from a lack of input validation when processing UPDATE messages. An authenticated attacker can exploit this flaw by sending a specially crafted UPDATE message, leading to resource exhaustion or service interruption on the affected FRR instance. Successful exploitation can disrupt network routing and availability. Defenders should apply the appropriate patches or mitigations to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated attacker gains network access to an FRR instance running a vulnerable version (stable/10.0 to stable/10.6).</li>
<li>The attacker crafts a malicious BGP UPDATE message specifically targeting the MP_REACH_NLRI component.</li>
<li>This crafted UPDATE message contains invalid or oversized data within the NLRI (Network Layer Reachability Information) fields.</li>
<li>The attacker sends the crafted UPDATE message to the targeted FRR instance.</li>
<li>The FRR instance receives the crafted UPDATE message and attempts to process the malformed NLRI data.</li>
<li>Due to the missing input validation, the FRR instance consumes excessive resources (CPU, memory) while processing the invalid NLRI.</li>
<li>The resource exhaustion leads to a denial of service, impacting the routing functionality of the FRR instance.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-37458 results in a denial-of-service condition, preventing the FRRouting instance from properly functioning. This can disrupt network routing, leading to connectivity issues and potential network outages. The impact is primarily a loss of availability for network services relying on the affected FRR instance. The number of potential victims depends on the deployment size of FRRouting within an organization&rsquo;s network infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade FRRouting instances to a patched version beyond stable/10.6 to remediate CVE-2026-37458.</li>
<li>Deploy the Sigma rule &ldquo;Detect CVE-2026-37458 Exploitation Attempt - Malformed BGP UPDATE Message&rdquo; to identify suspicious BGP UPDATE messages indicative of exploitation attempts.</li>
<li>Implement rate limiting for BGP UPDATE messages to mitigate the impact of potential DoS attacks.</li>
<li>Monitor network traffic for unusual patterns related to BGP UPDATE messages.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>denial-of-service</category><category>network</category><category>frrouting</category><category>cve-2026-37458</category></item></channel></rss>