Skip to content
CVSS 7.3 · HIGH

CVE-2026-7736

A vulnerability was determined in osrg GoBGP up to 4.3.0. Affected by this vulnerability is the function parseRibEntry of the file pkg/packet/mrt/mrt.go. Executing a manipulation can lead to integer underflow. It is possible to launch the attack remotely. Upgrading to version 4.4.0 addresses this issue. This patch is called 76d911046344a3923cbe573364197aa081944592. It is suggested to upgrade the affected component.

View on NVD

Analysis

GoBGP is a prominent open-source BGP implementation used in cloud networking and software-defined infrastructure. This integer underflow in the MRT packet parser is remotely exploitable and rated high severity, posing a risk to network availability.

Severity

Score: 7.3(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: LOW
I: LOW
A: LOW
Weakness (CWE): CWE-189CWE-191

EPSS

Probability of exploitation (next 30 days): 0.0005 (0.0%)
Percentile: 14.1%
EPSS: 2026-05-06

Affects

osrg:gobgp

Technical description

A vulnerability was determined in osrg GoBGP up to 4.3.0. Affected by this vulnerability is the function parseRibEntry of the file pkg/packet/mrt/mrt.go. Executing a manipulation can lead to integer underflow. It is possible to launch the attack remotely. Upgrading to version 4.4.0 addresses this issue. This patch is called 76d911046344a3923cbe573364197aa081944592. It is suggested to upgrade the affected component.

Published: 5/4/2026, 7:16:01 AM
Last modified: 5/6/2026, 8:27:43 PM

References

HomeEventsBlogResourcesTeam