Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-31948: n/a

0
Medium
VulnerabilityCVE-2024-31948cvecve-2024-31948
Published: Sun Apr 07 2024 (04/07/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

In FRRouting (FRR) through 9.1, an attacker using a malformed Prefix SID attribute in a BGP UPDATE packet can cause the bgpd daemon to crash.

AI-Powered Analysis

AILast updated: 11/04/2025, 17:09:57 UTC

Technical Analysis

CVE-2024-31948 is a vulnerability identified in FRRouting (FRR), an open-source routing software suite widely used for BGP (Border Gateway Protocol) routing. The issue exists in versions up to 9.1 of FRR, where the bgpd daemon improperly handles a malformed Prefix Segment Identifier (SID) attribute within a BGP UPDATE packet. The Prefix SID attribute is part of the Segment Routing (SR) extension to BGP, used to encode routing instructions. An attacker capable of sending a specially crafted BGP UPDATE packet with a malformed Prefix SID can trigger a crash of the bgpd daemon, causing a denial of service (DoS) condition. The vulnerability is classified under CWE-1287, which relates to improper handling of protocol attributes leading to resource exhaustion or crashes. Exploitation requires network-level access to send BGP UPDATE messages, and low privileges (PR:L) are sufficient, but no user interaction is needed. The CVSS v3.1 score is 6.5 (medium), reflecting that the attack vector is network-based, with low attack complexity, no confidentiality or integrity impact, but high impact on availability. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed proactively. The bgpd daemon crash can disrupt routing operations, potentially causing network outages or degraded performance in affected environments.

Potential Impact

For European organizations, especially ISPs, telecom operators, and large enterprises relying on FRRouting for BGP routing, this vulnerability poses a risk of network instability or outages due to bgpd daemon crashes. Disruption of BGP routing can lead to loss of connectivity, routing loops, or traffic blackholing, impacting business operations and service availability. Critical infrastructure providers and data centers using FRR could experience degraded network performance or downtime, affecting end users and dependent services. Although the vulnerability does not compromise confidentiality or integrity, the availability impact can be significant, especially in environments where FRR is a core routing component. The lack of known exploits reduces immediate risk, but the ease of triggering a crash with low privileges means attackers with network access could leverage this for denial of service attacks. European organizations with interconnected networks or peering arrangements using FRR should be vigilant, as BGP disruptions can cascade across networks.

Mitigation Recommendations

1. Monitor FRRouting project communications and apply official patches promptly once released to address CVE-2024-31948. 2. Implement strict ingress filtering and validation of BGP UPDATE packets at network boundaries to detect and block malformed Prefix SID attributes. 3. Use BGP session authentication mechanisms such as TCP MD5 or TCP-AO to restrict BGP peer access to trusted entities only. 4. Deploy network anomaly detection systems capable of identifying unusual BGP UPDATE patterns indicative of malformed attributes. 5. Maintain redundancy in routing infrastructure to minimize impact of bgpd daemon crashes, including automated failover and route flap dampening. 6. Conduct regular security audits and penetration tests focusing on routing protocol robustness. 7. Prepare incident response plans for rapid recovery from bgpd crashes, including automated daemon restarts and traffic rerouting. 8. Limit network access to BGP peers and restrict administrative privileges to reduce attack surface. These measures go beyond generic advice by focusing on protocol-specific filtering, authentication, and operational resilience tailored to FRR and BGP environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-04-07T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a2debf0ba78a050536edd

Added to database: 11/4/2025, 4:46:35 PM

Last enriched: 11/4/2025, 5:09:57 PM

Last updated: 11/5/2025, 2:09:58 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats