Skip to content
CVSS 7.3 · HIGH

CVE-2026-7736

A vulnerability was determined in osrg GoBGP up to 4.3.0. Affected by this vulnerability is the function parseRibEntry of the file pkg/packet/mrt/mrt.go. Executing a manipulation can lead to integer underflow. It is possible to launch the attack remotely. Upgrading to version 4.4.0 addresses this issue. This patch is called 76d911046344a3923cbe573364197aa081944592. It is suggested to upgrade the affected component.

Ver en NVD

Análisis

GoBGP is a prominent open-source BGP implementation used in cloud networking and software-defined infrastructure. This integer underflow in the MRT packet parser is remotely exploitable and rated high severity, posing a risk to network availability.

Severidad

Puntaje: 7.3(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: LOW
I: LOW
A: LOW
Tipo de falla (CWE): CWE-189CWE-191

EPSS

Probabilidad de explotación (próx. 30 días): 0.0005 (0.0%)
Percentil: 14.1%
EPSS: 2026-05-06

Afecta

osrg:gobgp

Descripción técnica

A vulnerability was determined in osrg GoBGP up to 4.3.0. Affected by this vulnerability is the function parseRibEntry of the file pkg/packet/mrt/mrt.go. Executing a manipulation can lead to integer underflow. It is possible to launch the attack remotely. Upgrading to version 4.4.0 addresses this issue. This patch is called 76d911046344a3923cbe573364197aa081944592. It is suggested to upgrade the affected component.

Publicada: 4/5/2026, 7:16:01
Última modificación: 6/5/2026, 20:27:43

Referencias

InicioEventosBlogRecursosEquipo