CVE-2026-5123

3.7 LOW
Published: March 30, 2026 Modified: April 06, 2026
View on NVD

Description

A weakness has been identified in osrg GoBGP up to 4.3.0. This impacts the function DecodeFromBytes of the file pkg/packet/bgp/bgp.go. Executing a manipulation of the argument data[1] can lead to off-by-one. The attack may be launched remotely. Attacks of this nature are highly complex. The exploitability is said to be difficult. This patch is called 67c059413470df64bc20801c46f64058e88f800f. A patch should be applied to remediate this issue.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/osrg/gobgp/
Source: cna@vuldb.com
Product
https://github.com/osrg/gobgp/pull/3342
Source: cna@vuldb.com
Issue Tracking
https://vuldb.com/submit/780179
Source: cna@vuldb.com
Third Party Advisory VDB Entry
https://vuldb.com/vuln/354155
Source: cna@vuldb.com
Third Party Advisory VDB Entry
https://vuldb.com/vuln/354155/cti
Source: cna@vuldb.com
Permissions Required VDB Entry

6 reference(s) from NVD

Quick Stats

CVSS v3 Score
3.7 / 10.0
EPSS (Exploit Probability)
0.1%
26th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

osrg