Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-31949: n/a

0
Medium
VulnerabilityCVE-2024-31949cvecve-2024-31949
Published: Sun Apr 07 2024 (04/07/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

In FRRouting (FRR) through 9.1, an infinite loop can occur when receiving a MP/GR capability as a dynamic capability because malformed data results in a pointer not advancing.

AI-Powered Analysis

AILast updated: 11/04/2025, 17:10:16 UTC

Technical Analysis

CVE-2024-31949 is a vulnerability identified in FRRouting (FRR), a widely used open-source routing software suite, up to version 9.1. The issue arises when FRR processes a Multiprotocol Graceful Restart (MP/GR) capability as a dynamic capability in routing protocol messages. Specifically, malformed data in this capability causes a pointer within the code to fail to advance correctly, resulting in an infinite loop during message processing. This infinite loop leads to a denial of service (DoS) condition by consuming excessive CPU resources, potentially causing the routing daemon to become unresponsive or crash. The vulnerability is exploitable remotely without any authentication (AV:N/PR:N), but requires user interaction (UI:R) in the form of receiving crafted routing protocol packets from a peer or attacker. The CVSS v3.1 base score is 6.5, reflecting a medium severity primarily due to the impact on availability without affecting confidentiality or integrity. No patches or exploits are currently publicly available, but the issue is documented and published as of April 2024. FRR is commonly deployed in Internet Service Providers (ISPs), data centers, and enterprise networks to manage routing protocols such as BGP and OSPF, making this vulnerability relevant for network infrastructure stability.

Potential Impact

For European organizations, the primary impact of CVE-2024-31949 is the potential for denial of service on critical routing infrastructure. Disruption of FRR routing daemons can lead to network outages, degraded performance, or routing instability, affecting business continuity and service availability. This is particularly critical for ISPs, cloud providers, and large enterprises relying on FRR for dynamic routing. While the vulnerability does not compromise data confidentiality or integrity, the loss of availability can indirectly impact operations and customer trust. Given the reliance on FRR in backbone and edge routing within Europe, successful exploitation could disrupt internet connectivity or internal network communications. The lack of known exploits reduces immediate risk, but the medium severity score and ease of remote exploitation warrant proactive mitigation.

Mitigation Recommendations

Organizations should monitor FRRouting project communications for official patches addressing CVE-2024-31949 and apply updates promptly once released. In the interim, network administrators can implement ingress filtering to block malformed or unexpected MP/GR capability messages from untrusted peers. Deploying rate limiting on routing protocol traffic can reduce the risk of resource exhaustion. Network segmentation and strict peer authentication can limit exposure to potentially malicious routing updates. Additionally, monitoring FRR daemon health and setting automated restart policies can help recover from potential DoS conditions. Conducting regular security assessments of routing infrastructure and maintaining up-to-date software versions will further reduce risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-04-07T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a2debf0ba78a050536ee3

Added to database: 11/4/2025, 4:46:35 PM

Last enriched: 11/4/2025, 5:10:16 PM

Last updated: 11/5/2025, 2:08:34 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats