CVE-2026-5123

medium

Description

A weakness has been identified in osrg GoBGP up to 4.3.0. This impacts the function DecodeFromBytes of the file pkg/packet/bgp/bgp.go. Executing a manipulation of the argument data[1] can lead to off-by-one. The attack may be launched remotely. Attacks of this nature are highly complex. The exploitability is said to be difficult. This patch is called 67c059413470df64bc20801c46f64058e88f800f. A patch should be applied to remediate this issue.

References

https://vuldb.com/vuln/354155/cti

https://vuldb.com/vuln/354155

https://vuldb.com/submit/780179

https://github.com/osrg/gobgp/pull/3342

https://github.com/osrg/gobgp/commit/67c059413470df64bc20801c46f64058e88f800f

https://github.com/osrg/gobgp/

Details

Source: Mitre, NVD

Published: 2026-03-30

Updated: 2026-04-01

Risk Information

CVSS v2

Base Score: 2.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:P

Severity: Low

CVSS v3

Base Score: 3.7

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L

Severity: Low

CVSS v4

Base Score: 6.3

Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Severity: Medium

EPSS

EPSS: 0.00047