Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61102: n/a

0
High
VulnerabilityCVE-2025-61102cvecve-2025-61102
Published: Mon Oct 27 2025 (10/27/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_ext_link_adj_sid function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted OSPF packet.

AI-Powered Analysis

AILast updated: 11/04/2025, 03:17:49 UTC

Technical Analysis

CVE-2025-61102 is a vulnerability identified in the FRRouting (FRR) software suite, specifically affecting versions from 4.0 through 10.4.1. The issue stems from a NULL pointer dereference in the show_vty_ext_link_adj_sid function located in the ospf_ext.c source file. This function is involved in processing OSPF (Open Shortest Path First) routing protocol packets, particularly those related to segment routing extensions. An attacker can exploit this vulnerability by crafting and sending a malicious OSPF packet that triggers the NULL pointer dereference, causing the FRRouting daemon to crash or become unresponsive. This results in a Denial of Service (DoS) condition, disrupting routing operations and potentially causing network outages. The vulnerability is remotely exploitable without requiring any authentication or user interaction, increasing the risk profile. The CVSS v3.1 base score is 7.5, reflecting a high severity primarily due to the impact on availability and the low complexity of the attack vector. No known public exploits have been reported yet, and no patches were linked at the time of disclosure, indicating that organizations should prioritize monitoring and mitigation efforts. The underlying cause is classified under CWE-476 (NULL Pointer Dereference), a common programming error that leads to software crashes when dereferencing invalid memory pointers. FRRouting is widely used in enterprise and service provider networks for dynamic routing, making this vulnerability particularly relevant for critical infrastructure.

Potential Impact

The primary impact of CVE-2025-61102 is a Denial of Service against network routing infrastructure using FRRouting with OSPF enabled. For European organizations, this can lead to significant network outages, degraded service availability, and potential cascading failures in interconnected networks. Enterprises relying on FRRouting for internal or edge routing may experience loss of connectivity, impacting business operations, cloud services, and critical communications. Telecommunications providers and data centers using FRRouting as part of their routing stack could face service disruptions affecting large customer bases. The vulnerability does not impact confidentiality or integrity directly but compromises availability, which is critical for network stability. Given the remote exploitability without authentication, attackers can launch attacks from outside the network perimeter, increasing the threat surface. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score indicates that exploitation could have severe operational consequences.

Mitigation Recommendations

1. Monitor FRRouting vendor channels closely for official patches addressing CVE-2025-61102 and apply them immediately upon release. 2. Implement network-level filtering to block or rate-limit OSPF packets from untrusted or external sources, reducing exposure to crafted malicious packets. 3. Employ segmentation and strict access controls on routing protocol traffic to limit which devices can send OSPF packets to FRRouting instances. 4. Enable and enhance logging and monitoring of FRRouting daemons to detect abnormal crashes or restarts indicative of exploitation attempts. 5. Consider deploying redundant routing paths and failover mechanisms to maintain network availability in case of a DoS event. 6. Conduct internal vulnerability assessments and penetration tests simulating crafted OSPF packets to evaluate exposure and response readiness. 7. Educate network operations teams about this vulnerability and establish incident response procedures specific to routing daemon failures. These steps go beyond generic advice by focusing on network protocol filtering, operational monitoring, and resilience planning tailored to FRRouting and OSPF environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ffd110ba6dffc5e20b749d

Added to database: 10/27/2025, 8:07:44 PM

Last enriched: 11/4/2025, 3:17:49 AM

Last updated: 12/10/2025, 3:29:48 PM

Views: 143

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats