CVE-2025-61103: n/a
FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_ext_link_lan_adj_sid function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted OSPF packet.
AI Analysis
Technical Summary
CVE-2025-61103 is a denial-of-service vulnerability identified in the FRRouting (FRR) open-source routing software, specifically affecting versions 4.0 through 10.4.1. The root cause is a NULL pointer dereference in the function show_vty_ext_link_lan_adj_sid located in the ospf_ext.c source file. This function is involved in processing OSPF (Open Shortest Path First) protocol packets, which are used for dynamic routing in IP networks. An attacker can exploit this vulnerability by crafting a malicious OSPF packet that triggers the NULL pointer dereference, causing the affected FRR process to crash or become unresponsive. This results in a denial of service (DoS) condition, disrupting routing operations and potentially causing network outages. The vulnerability does not require authentication or user interaction beyond the ability to send OSPF packets to the target device. While no public exploits have been reported, the flaw's nature suggests it could be weaponized by attackers with network access. FRR is widely used in various network devices and environments, including ISPs, data centers, and enterprise networks, making this vulnerability significant for network availability and stability. No official patches or CVSS score have been published at the time of disclosure, but mitigation will likely involve updating FRR to a fixed version once available and applying network controls to limit exposure to untrusted OSPF traffic.
Potential Impact
The primary impact of CVE-2025-61103 is on the availability of network routing infrastructure. Exploitation causes a denial of service by crashing the FRR routing daemon handling OSPF, which can lead to routing disruptions, network outages, and degraded service quality. For European organizations, this can affect ISPs, cloud providers, data centers, and enterprises relying on FRR for OSPF routing, potentially disrupting critical communications and business operations. The vulnerability could be leveraged in targeted attacks against network infrastructure or as part of broader campaigns to degrade network reliability. Given the importance of OSPF in internal and inter-domain routing, the impact can cascade to multiple network segments. The lack of known exploits reduces immediate risk, but the ease of triggering the flaw via crafted OSPF packets means attackers with network access could exploit it. This is particularly concerning for networks with insufficient segmentation or exposure of routing protocols to untrusted networks.
Mitigation Recommendations
1. Monitor FRRouting project communications and security advisories for patches addressing CVE-2025-61103 and apply updates promptly once available. 2. Implement strict network segmentation and access controls to restrict OSPF traffic only to trusted devices and interfaces, minimizing exposure to potentially malicious packets. 3. Deploy filtering rules on routers and firewalls to block or rate-limit unexpected or malformed OSPF packets from untrusted sources. 4. Use network monitoring tools to detect unusual OSPF traffic patterns that could indicate exploitation attempts. 5. Consider deploying redundancy and failover mechanisms in routing infrastructure to maintain network availability if a device is impacted. 6. Conduct regular security assessments of network devices running FRR to ensure configurations follow best practices and minimize attack surface. 7. Educate network operations teams about this vulnerability and response procedures to quickly isolate affected devices if exploitation is suspected.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-61103: n/a
Description
FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_ext_link_lan_adj_sid function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted OSPF packet.
AI-Powered Analysis
Technical Analysis
CVE-2025-61103 is a denial-of-service vulnerability identified in the FRRouting (FRR) open-source routing software, specifically affecting versions 4.0 through 10.4.1. The root cause is a NULL pointer dereference in the function show_vty_ext_link_lan_adj_sid located in the ospf_ext.c source file. This function is involved in processing OSPF (Open Shortest Path First) protocol packets, which are used for dynamic routing in IP networks. An attacker can exploit this vulnerability by crafting a malicious OSPF packet that triggers the NULL pointer dereference, causing the affected FRR process to crash or become unresponsive. This results in a denial of service (DoS) condition, disrupting routing operations and potentially causing network outages. The vulnerability does not require authentication or user interaction beyond the ability to send OSPF packets to the target device. While no public exploits have been reported, the flaw's nature suggests it could be weaponized by attackers with network access. FRR is widely used in various network devices and environments, including ISPs, data centers, and enterprise networks, making this vulnerability significant for network availability and stability. No official patches or CVSS score have been published at the time of disclosure, but mitigation will likely involve updating FRR to a fixed version once available and applying network controls to limit exposure to untrusted OSPF traffic.
Potential Impact
The primary impact of CVE-2025-61103 is on the availability of network routing infrastructure. Exploitation causes a denial of service by crashing the FRR routing daemon handling OSPF, which can lead to routing disruptions, network outages, and degraded service quality. For European organizations, this can affect ISPs, cloud providers, data centers, and enterprises relying on FRR for OSPF routing, potentially disrupting critical communications and business operations. The vulnerability could be leveraged in targeted attacks against network infrastructure or as part of broader campaigns to degrade network reliability. Given the importance of OSPF in internal and inter-domain routing, the impact can cascade to multiple network segments. The lack of known exploits reduces immediate risk, but the ease of triggering the flaw via crafted OSPF packets means attackers with network access could exploit it. This is particularly concerning for networks with insufficient segmentation or exposure of routing protocols to untrusted networks.
Mitigation Recommendations
1. Monitor FRRouting project communications and security advisories for patches addressing CVE-2025-61103 and apply updates promptly once available. 2. Implement strict network segmentation and access controls to restrict OSPF traffic only to trusted devices and interfaces, minimizing exposure to potentially malicious packets. 3. Deploy filtering rules on routers and firewalls to block or rate-limit unexpected or malformed OSPF packets from untrusted sources. 4. Use network monitoring tools to detect unusual OSPF traffic patterns that could indicate exploitation attempts. 5. Consider deploying redundancy and failover mechanisms in routing infrastructure to maintain network availability if a device is impacted. 6. Conduct regular security assessments of network devices running FRR to ensure configurations follow best practices and minimize attack surface. 7. Educate network operations teams about this vulnerability and response procedures to quickly isolate affected devices if exploitation is suspected.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-26T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6900de73d44cb7cb50ff0afa
Added to database: 10/28/2025, 3:17:07 PM
Last enriched: 10/28/2025, 3:18:45 PM
Last updated: 10/30/2025, 6:26:13 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62229: Use After Free in Red Hat Red Hat Enterprise Linux 10
HighCVE-2025-11627: CWE-117 Improper Output Neutralization for Logs in sminozzi Site Checkup Debug AI Troubleshooting with Wizard and Tips for Each Issue
MediumCVE-2025-10008: CWE-862 Missing Authorization in remyb92 Translate WordPress and go Multilingual – Weglot
MediumCVE-2025-10636: CWE-79 Cross-Site Scripting (XSS) in NS Maintenance Mode for WP
HighCVE-2025-62230: Use After Free in Red Hat Red Hat Enterprise Linux 10
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.