Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-47234: n/a

0
High
VulnerabilityCVE-2023-47234cvecve-2023-47234
Published: Fri Nov 03 2023 (11/03/2023, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur when processing a crafted BGP UPDATE message with a MP_UNREACH_NLRI attribute and additional NLRI data (that lacks mandatory path attributes).

AI-Powered Analysis

AILast updated: 11/04/2025, 16:52:44 UTC

Technical Analysis

CVE-2023-47234 is a vulnerability identified in FRRouting (FRR), an open-source routing software suite widely used for BGP routing, up to version 9.0.1. The flaw arises when FRR processes a crafted BGP UPDATE message that includes a Multiprotocol Unreachable Network Layer Reachability Information (MP_UNREACH_NLRI) attribute accompanied by additional NLRI data that lacks the mandatory path attributes. This malformed message triggers a crash in the FRR daemon, resulting in a denial of service (DoS) condition. The vulnerability can be exploited remotely without any authentication or user interaction, as BGP sessions are typically established between routers over the network. The CVSS 3.1 base score is 7.5, reflecting high severity due to the network attack vector, low attack complexity, and the impact limited to availability (no confidentiality or integrity loss). Although no known exploits have been reported in the wild, the vulnerability poses a risk to network stability, especially in environments where FRR is deployed as a critical routing component. The absence of mandatory path attributes in the crafted BGP message is the root cause, which leads to improper handling and crash of the routing process. This can disrupt routing tables and cause network outages or degraded performance. FRR is commonly used by ISPs, data centers, and enterprises for BGP routing, making this vulnerability relevant to organizations managing internet-facing infrastructure.

Potential Impact

For European organizations, the primary impact of CVE-2023-47234 is the potential for denial of service on critical BGP routing infrastructure. This can lead to network outages, loss of connectivity, and degraded performance affecting internet service providers, cloud providers, and large enterprises relying on FRR for routing. Disruptions in BGP routing can cascade, impacting inter-domain routing and causing broader internet instability. Confidentiality and integrity of data are not directly affected, but availability is significantly compromised. Organizations with large-scale network operations or those providing backbone internet services in Europe could experience operational disruptions, customer impact, and potential financial losses. The vulnerability also increases the attack surface for threat actors aiming to disrupt network services. Given the reliance on FRR in many European telecom and hosting providers, the risk of service degradation or outages is non-trivial.

Mitigation Recommendations

1. Apply patches or updates from the FRRouting project as soon as they become available to address CVE-2023-47234. 2. Implement strict BGP message validation and filtering on routers to reject malformed or suspicious BGP UPDATE messages, particularly those containing MP_UNREACH_NLRI attributes with missing path attributes. 3. Use prefix filtering and route validation to limit exposure to potentially malicious BGP updates. 4. Monitor BGP session stability and logs for unusual update patterns or crashes indicative of exploitation attempts. 5. Employ network segmentation and isolate BGP routers from untrusted networks to reduce attack surface. 6. Consider deploying BGP session protection mechanisms such as TCP MD5 signatures or BGP TTL security to prevent unauthorized BGP message injection. 7. Maintain an incident response plan for network outages caused by routing disruptions. 8. Engage with vendors and community forums for timely threat intelligence and patch information regarding FRR vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-11-03T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a2ddef0ba78a050535b0c

Added to database: 11/4/2025, 4:46:22 PM

Last enriched: 11/4/2025, 4:52:44 PM

Last updated: 11/6/2025, 6:51:00 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats