Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-38406: n/a

0
Unknown
VulnerabilityCVE-2023-38406cvecve-2023-38406
Published: Mon Nov 06 2023 (11/06/2023, 00:00:00 UTC)
Source: CVE Database V5

Description

bgpd/bgp_flowspec.c in FRRouting (FRR) before 8.4.3 mishandles an nlri length of zero, aka a "flowspec overflow."

AI-Powered Analysis

AILast updated: 11/04/2025, 16:51:20 UTC

Technical Analysis

CVE-2023-38406 is a security vulnerability found in the FRRouting (FRR) software, a widely used open-source routing suite that supports various routing protocols including BGP (Border Gateway Protocol). The vulnerability resides in the BGP flowspec component, specifically in the handling of Network Layer Reachability Information (NLRI) within the bgpd/bgp_flowspec.c source file. The issue arises when the NLRI length is zero, which is an unexpected and malformed input. FRR versions prior to 8.4.3 do not properly validate or handle this zero-length NLRI, resulting in a flowspec overflow. This overflow can cause memory corruption, which may be leveraged by an attacker to disrupt the routing daemon's operation, leading to denial of service (DoS). In some cases, memory corruption vulnerabilities can be escalated to remote code execution, although no public exploits or proof-of-concept code have been reported to date. BGP flowspec is used to distribute traffic filtering rules dynamically across routers, so a compromised or crashed BGP daemon can severely impact network traffic management and security policies. The vulnerability was publicly disclosed on November 6, 2023, with no CVSS score assigned yet. The flaw affects all FRR deployments running versions before 8.4.3 that have BGP flowspec enabled. Since FRR is commonly deployed in internet service providers, data centers, and enterprise networks, this vulnerability poses a significant risk to network infrastructure stability and security.

Potential Impact

For European organizations, the impact of CVE-2023-38406 can be substantial, particularly for ISPs, cloud providers, and large enterprises that rely on FRR for BGP routing and traffic filtering. Exploitation could lead to denial of service conditions, disrupting internet connectivity and traffic management. This could affect critical services, including telecommunications, financial services, and government networks, potentially causing outages or degraded performance. Additionally, if an attacker manages to escalate the memory corruption to remote code execution, they could gain control over routing infrastructure, enabling traffic interception, manipulation, or further lateral movement within networks. The disruption of BGP flowspec could also undermine security policies designed to mitigate DDoS attacks or filter malicious traffic, increasing exposure to other threats. Given the central role of BGP in internet routing, the vulnerability could have cascading effects beyond the directly affected networks.

Mitigation Recommendations

The primary mitigation is to upgrade FRRouting to version 8.4.3 or later, where the vulnerability has been addressed. Organizations should audit their network infrastructure to identify all FRR instances running vulnerable versions, especially those with BGP flowspec enabled. If immediate upgrade is not feasible, disabling BGP flowspec temporarily can reduce the attack surface. Network administrators should also implement strict ingress filtering and validate BGP updates to prevent malformed NLRI data from untrusted sources. Monitoring BGP daemon logs for unusual behavior or crashes can help detect exploitation attempts. Employing network segmentation and limiting administrative access to routing infrastructure reduces the risk of exploitation. Finally, staying informed about vendor patches and applying them promptly is critical to maintaining security.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-07-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690a2dddf0ba78a050535af0

Added to database: 11/4/2025, 4:46:21 PM

Last enriched: 11/4/2025, 4:51:20 PM

Last updated: 11/6/2025, 10:21:43 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats