CVE-2026-5122

3.7 LOW
Published: March 30, 2026 Modified: April 08, 2026
View on NVD

Description

A security flaw has been discovered in osrg GoBGP up to 4.3.0. This affects the function DecodeFromBytes of the file pkg/packet/bgp/bgp.go of the component BGP OPEN Message Handler. Performing a manipulation of the argument domainNameLen results in improper access controls. The attack may be initiated remotely. A high degree of complexity is needed for the attack. The exploitability is reported as difficult. The patch is named 2b09db390a3d455808363c53e409afe6b1b86d2d. It is suggested to install a patch to address this issue.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/osrg/gobgp/
Source: cna@vuldb.com
Product
https://github.com/osrg/gobgp/pull/3343
Source: cna@vuldb.com
Issue Tracking
https://vuldb.com/submit/780124
Source: cna@vuldb.com
Third Party Advisory VDB Entry
https://vuldb.com/vuln/354154
Source: cna@vuldb.com
Third Party Advisory VDB Entry
https://vuldb.com/vuln/354154/cti
Source: cna@vuldb.com
Permissions Required VDB Entry

6 reference(s) from NVD

Quick Stats

CVSS v3 Score
3.7 / 10.0
EPSS (Exploit Probability)
0.1%
17th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

osrg