Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61107: n/a

0
High
VulnerabilityCVE-2025-61107cvecve-2025-61107
Published: Tue Oct 28 2025 (10/28/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_ext_pref_pref_sid function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted LSA Update packet.

AI-Powered Analysis

AILast updated: 10/28/2025, 15:19:26 UTC

Technical Analysis

CVE-2025-61107 is a vulnerability identified in the FRRouting (FRR) software suite, specifically affecting versions from 4.0 up to 10.4.1. The flaw exists in the show_vty_ext_pref_pref_sid function located in the ospf_ext.c source file, where a NULL pointer dereference can be triggered. This occurs when processing a crafted OSPF (Open Shortest Path First) LSA (Link State Advertisement) Update packet. OSPF is a widely used interior gateway routing protocol in IP networks, and FRRouting is a popular open-source routing software used in many network devices and environments. The NULL pointer dereference leads to a crash of the FRRouting daemon, causing a denial of service (DoS) condition by disrupting routing operations. Exploitation does not require authentication but does require the attacker to send malicious OSPF packets, which implies network-level access or the ability to inject OSPF traffic. No public exploits have been reported yet, and no official patches or CVSS scores have been published at the time of disclosure. The vulnerability affects network availability and could lead to routing outages or instability, impacting network reliability and potentially causing cascading failures in dependent systems.

Potential Impact

For European organizations, the impact of CVE-2025-61107 can be significant, especially for those relying on FRRouting in critical network infrastructure such as ISPs, data centers, cloud providers, and large enterprises with complex routing needs. A successful attack could cause network outages, interrupting business operations, degrading service quality, and potentially causing financial and reputational damage. The disruption of routing services can affect internal communications, internet connectivity, and inter-network data flows. In sectors like finance, healthcare, and government, where network availability is crucial, this vulnerability could lead to operational paralysis or compromise service-level agreements. Additionally, the downtime caused by the DoS could be exploited as a diversion for other attacks. The lack of authentication requirement increases the risk, as attackers with network access can trigger the vulnerability without needing privileged credentials.

Mitigation Recommendations

To mitigate CVE-2025-61107, organizations should prioritize updating FRRouting to a version that includes a fix once it is released by the maintainers. Until a patch is available, network administrators should implement strict filtering of OSPF packets, allowing only trusted sources to send OSPF updates. This can be achieved by configuring access control lists (ACLs) or firewall rules on routers and switches to block unauthorized OSPF traffic. Monitoring network devices for unexpected crashes or restarts can help detect exploitation attempts early. Network segmentation can limit the exposure of routing devices to untrusted networks. Additionally, employing anomaly detection systems to identify unusual OSPF packet patterns may provide early warning signs of exploitation attempts. Regular backups of router configurations and having a recovery plan in place will help minimize downtime if an attack occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6900de73d44cb7cb50ff0b0c

Added to database: 10/28/2025, 3:17:07 PM

Last enriched: 10/28/2025, 3:19:26 PM

Last updated: 10/30/2025, 10:17:56 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats