CVE-2023-47234: n/a
An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur when processing a crafted BGP UPDATE message with a MP_UNREACH_NLRI attribute and additional NLRI data (that lacks mandatory path attributes).
AI Analysis
Technical Summary
CVE-2023-47234 is a vulnerability identified in FRRouting (FRR), an open-source routing software suite widely used for BGP routing, up to version 9.0.1. The flaw arises when FRR processes a crafted BGP UPDATE message that includes a Multiprotocol Unreachable Network Layer Reachability Information (MP_UNREACH_NLRI) attribute accompanied by additional NLRI data that lacks the mandatory path attributes. This malformed message triggers a crash in the FRR daemon, resulting in a denial of service (DoS) condition. The vulnerability can be exploited remotely without any authentication or user interaction, as BGP sessions are typically established between routers over the network. The CVSS 3.1 base score is 7.5, reflecting high severity due to the network attack vector, low attack complexity, and the impact limited to availability (no confidentiality or integrity loss). Although no known exploits have been reported in the wild, the vulnerability poses a risk to network stability, especially in environments where FRR is deployed as a critical routing component. The absence of mandatory path attributes in the crafted BGP message is the root cause, which leads to improper handling and crash of the routing process. This can disrupt routing tables and cause network outages or degraded performance. FRR is commonly used by ISPs, data centers, and enterprises for BGP routing, making this vulnerability relevant to organizations managing internet-facing infrastructure.
Potential Impact
For European organizations, the primary impact of CVE-2023-47234 is the potential for denial of service on critical BGP routing infrastructure. This can lead to network outages, loss of connectivity, and degraded performance affecting internet service providers, cloud providers, and large enterprises relying on FRR for routing. Disruptions in BGP routing can cascade, impacting inter-domain routing and causing broader internet instability. Confidentiality and integrity of data are not directly affected, but availability is significantly compromised. Organizations with large-scale network operations or those providing backbone internet services in Europe could experience operational disruptions, customer impact, and potential financial losses. The vulnerability also increases the attack surface for threat actors aiming to disrupt network services. Given the reliance on FRR in many European telecom and hosting providers, the risk of service degradation or outages is non-trivial.
Mitigation Recommendations
1. Apply patches or updates from the FRRouting project as soon as they become available to address CVE-2023-47234. 2. Implement strict BGP message validation and filtering on routers to reject malformed or suspicious BGP UPDATE messages, particularly those containing MP_UNREACH_NLRI attributes with missing path attributes. 3. Use prefix filtering and route validation to limit exposure to potentially malicious BGP updates. 4. Monitor BGP session stability and logs for unusual update patterns or crashes indicative of exploitation attempts. 5. Employ network segmentation and isolate BGP routers from untrusted networks to reduce attack surface. 6. Consider deploying BGP session protection mechanisms such as TCP MD5 signatures or BGP TTL security to prevent unauthorized BGP message injection. 7. Maintain an incident response plan for network outages caused by routing disruptions. 8. Engage with vendors and community forums for timely threat intelligence and patch information regarding FRR vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2023-47234: n/a
Description
An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur when processing a crafted BGP UPDATE message with a MP_UNREACH_NLRI attribute and additional NLRI data (that lacks mandatory path attributes).
AI-Powered Analysis
Technical Analysis
CVE-2023-47234 is a vulnerability identified in FRRouting (FRR), an open-source routing software suite widely used for BGP routing, up to version 9.0.1. The flaw arises when FRR processes a crafted BGP UPDATE message that includes a Multiprotocol Unreachable Network Layer Reachability Information (MP_UNREACH_NLRI) attribute accompanied by additional NLRI data that lacks the mandatory path attributes. This malformed message triggers a crash in the FRR daemon, resulting in a denial of service (DoS) condition. The vulnerability can be exploited remotely without any authentication or user interaction, as BGP sessions are typically established between routers over the network. The CVSS 3.1 base score is 7.5, reflecting high severity due to the network attack vector, low attack complexity, and the impact limited to availability (no confidentiality or integrity loss). Although no known exploits have been reported in the wild, the vulnerability poses a risk to network stability, especially in environments where FRR is deployed as a critical routing component. The absence of mandatory path attributes in the crafted BGP message is the root cause, which leads to improper handling and crash of the routing process. This can disrupt routing tables and cause network outages or degraded performance. FRR is commonly used by ISPs, data centers, and enterprises for BGP routing, making this vulnerability relevant to organizations managing internet-facing infrastructure.
Potential Impact
For European organizations, the primary impact of CVE-2023-47234 is the potential for denial of service on critical BGP routing infrastructure. This can lead to network outages, loss of connectivity, and degraded performance affecting internet service providers, cloud providers, and large enterprises relying on FRR for routing. Disruptions in BGP routing can cascade, impacting inter-domain routing and causing broader internet instability. Confidentiality and integrity of data are not directly affected, but availability is significantly compromised. Organizations with large-scale network operations or those providing backbone internet services in Europe could experience operational disruptions, customer impact, and potential financial losses. The vulnerability also increases the attack surface for threat actors aiming to disrupt network services. Given the reliance on FRR in many European telecom and hosting providers, the risk of service degradation or outages is non-trivial.
Mitigation Recommendations
1. Apply patches or updates from the FRRouting project as soon as they become available to address CVE-2023-47234. 2. Implement strict BGP message validation and filtering on routers to reject malformed or suspicious BGP UPDATE messages, particularly those containing MP_UNREACH_NLRI attributes with missing path attributes. 3. Use prefix filtering and route validation to limit exposure to potentially malicious BGP updates. 4. Monitor BGP session stability and logs for unusual update patterns or crashes indicative of exploitation attempts. 5. Employ network segmentation and isolate BGP routers from untrusted networks to reduce attack surface. 6. Consider deploying BGP session protection mechanisms such as TCP MD5 signatures or BGP TTL security to prevent unauthorized BGP message injection. 7. Maintain an incident response plan for network outages caused by routing disruptions. 8. Engage with vendors and community forums for timely threat intelligence and patch information regarding FRR vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2023-11-03T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a2ddef0ba78a050535b0c
Added to database: 11/4/2025, 4:46:22 PM
Last enriched: 11/4/2025, 4:52:44 PM
Last updated: 11/6/2025, 6:51:00 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9338: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in ASUS Armoury Crate
HighCVE-2025-12560: CWE-918 Server-Side Request Forgery (SSRF) in pr-gateway Blog2Social: Social Media Auto Post & Scheduler
MediumCVE-2025-12563: CWE-862 Missing Authorization in pr-gateway Blog2Social: Social Media Auto Post & Scheduler
MediumCVE-2025-11271: CWE-807 Reliance on Untrusted Inputs in a Security Decision in smub Easy Digital Downloads – eCommerce Payments and Subscriptions made easy
MediumCVE-2025-61994: Cross-site scripting (XSS) in GROWI, Inc. GROWI
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.