Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61103: n/a

0
High
VulnerabilityCVE-2025-61103cvecve-2025-61103
Published: Tue Oct 28 2025 (10/28/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_ext_link_lan_adj_sid function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted OSPF packet.

AI-Powered Analysis

AILast updated: 10/28/2025, 15:18:45 UTC

Technical Analysis

CVE-2025-61103 is a denial-of-service vulnerability identified in the FRRouting (FRR) open-source routing software, specifically affecting versions 4.0 through 10.4.1. The root cause is a NULL pointer dereference in the function show_vty_ext_link_lan_adj_sid located in the ospf_ext.c source file. This function is involved in processing OSPF (Open Shortest Path First) protocol packets, which are used for dynamic routing in IP networks. An attacker can exploit this vulnerability by crafting a malicious OSPF packet that triggers the NULL pointer dereference, causing the affected FRR process to crash or become unresponsive. This results in a denial of service (DoS) condition, disrupting routing operations and potentially causing network outages. The vulnerability does not require authentication or user interaction beyond the ability to send OSPF packets to the target device. While no public exploits have been reported, the flaw's nature suggests it could be weaponized by attackers with network access. FRR is widely used in various network devices and environments, including ISPs, data centers, and enterprise networks, making this vulnerability significant for network availability and stability. No official patches or CVSS score have been published at the time of disclosure, but mitigation will likely involve updating FRR to a fixed version once available and applying network controls to limit exposure to untrusted OSPF traffic.

Potential Impact

The primary impact of CVE-2025-61103 is on the availability of network routing infrastructure. Exploitation causes a denial of service by crashing the FRR routing daemon handling OSPF, which can lead to routing disruptions, network outages, and degraded service quality. For European organizations, this can affect ISPs, cloud providers, data centers, and enterprises relying on FRR for OSPF routing, potentially disrupting critical communications and business operations. The vulnerability could be leveraged in targeted attacks against network infrastructure or as part of broader campaigns to degrade network reliability. Given the importance of OSPF in internal and inter-domain routing, the impact can cascade to multiple network segments. The lack of known exploits reduces immediate risk, but the ease of triggering the flaw via crafted OSPF packets means attackers with network access could exploit it. This is particularly concerning for networks with insufficient segmentation or exposure of routing protocols to untrusted networks.

Mitigation Recommendations

1. Monitor FRRouting project communications and security advisories for patches addressing CVE-2025-61103 and apply updates promptly once available. 2. Implement strict network segmentation and access controls to restrict OSPF traffic only to trusted devices and interfaces, minimizing exposure to potentially malicious packets. 3. Deploy filtering rules on routers and firewalls to block or rate-limit unexpected or malformed OSPF packets from untrusted sources. 4. Use network monitoring tools to detect unusual OSPF traffic patterns that could indicate exploitation attempts. 5. Consider deploying redundancy and failover mechanisms in routing infrastructure to maintain network availability if a device is impacted. 6. Conduct regular security assessments of network devices running FRR to ensure configurations follow best practices and minimize attack surface. 7. Educate network operations teams about this vulnerability and response procedures to quickly isolate affected devices if exploitation is suspected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6900de73d44cb7cb50ff0afa

Added to database: 10/28/2025, 3:17:07 PM

Last enriched: 10/28/2025, 3:18:45 PM

Last updated: 10/30/2025, 6:26:13 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats