Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61104: n/a

0
High
VulnerabilityCVE-2025-61104cvecve-2025-61104
Published: Tue Oct 28 2025 (10/28/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_unknown_tlv function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted OSPF packet.

AI-Powered Analysis

AILast updated: 10/28/2025, 15:18:59 UTC

Technical Analysis

CVE-2025-61104 affects FRRouting (FRR), an open-source routing software suite widely used in network infrastructure for dynamic routing protocols including OSPF. The vulnerability arises from a NULL pointer dereference in the show_vty_unknown_tlv function located in the ospf_ext.c source file. This function processes OSPF TLVs (Type-Length-Value structures) and fails to properly validate or handle unexpected or malformed TLVs. An attacker can exploit this flaw by crafting a malicious OSPF packet containing a malformed TLV that triggers the NULL pointer dereference when processed by the vulnerable FRR version (4.0 through 10.4.1). The result is a denial of service condition where the routing process crashes or becomes unresponsive, disrupting routing operations. Since OSPF is a critical interior gateway protocol used to exchange routing information within an autonomous system, such disruption can lead to network outages or degraded performance. The vulnerability does not require authentication, but the attacker must be able to send OSPF packets to the target device, which typically implies network access to the routing domain or adjacency. No CVSS score has been assigned yet, and no public exploits are known at this time. However, the vulnerability's impact on availability and the relative ease of exploitation make it a significant threat to networks using FRRouting for OSPF routing.

Potential Impact

For European organizations, especially ISPs, data centers, and enterprises relying on FRRouting for OSPF routing, this vulnerability poses a risk of network outages or degraded service availability. Disruption of OSPF routing can cause loss of connectivity between network segments, impacting business operations, cloud services, and critical infrastructure. In sectors such as telecommunications, finance, and government, where network reliability is paramount, exploitation could lead to significant operational and financial consequences. Additionally, denial of service conditions in routing infrastructure could be leveraged as part of broader multi-stage attacks or to facilitate lateral movement within networks. The absence of known exploits currently reduces immediate risk, but the potential for future exploitation remains. Organizations with large-scale or complex OSPF deployments are particularly vulnerable to cascading failures triggered by this flaw.

Mitigation Recommendations

1. Monitor FRRouting project communications and security advisories for the release of patches addressing CVE-2025-61104 and apply updates promptly. 2. Until patches are available, implement network-level controls to restrict OSPF packet sources to trusted devices only, using ACLs or firewall rules to block unauthorized OSPF traffic. 3. Segment routing domains to limit exposure of vulnerable FRR instances to untrusted networks or external attackers. 4. Employ OSPF authentication mechanisms (e.g., MD5 or SHA-based authentication) to prevent unauthorized OSPF packet injection, reducing the attack surface. 5. Conduct network traffic analysis to detect anomalous or malformed OSPF packets that could indicate exploitation attempts. 6. Maintain robust network monitoring and incident response capabilities to quickly identify and mitigate denial of service conditions. 7. Review and harden router configurations to minimize unnecessary exposure of routing protocols to external or less trusted network segments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6900de73d44cb7cb50ff0b00

Added to database: 10/28/2025, 3:17:07 PM

Last enriched: 10/28/2025, 3:18:59 PM

Last updated: 10/30/2025, 6:26:13 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats