Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30405: n/a

0
Unknown
VulnerabilityCVE-2026-30405cvecve-2026-30405
Published: Mon Mar 16 2026 (03/16/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in GoBGP gobgpd v.4.2.0 allows a remote attacker to cause a denial of service via the NEXT_HOP path attribute

AI-Powered Analysis

AILast updated: 03/16/2026, 16:51:04 UTC

Technical Analysis

CVE-2026-30405 is a denial of service vulnerability identified in GoBGP version 4.2.0, an open-source BGP (Border Gateway Protocol) implementation widely used for inter-domain routing on the internet. The vulnerability arises from improper handling of the NEXT_HOP path attribute in BGP update messages. The NEXT_HOP attribute specifies the next hop IP address that should be used to reach a destination network. In this case, a remote attacker can craft malicious BGP update messages with specially manipulated NEXT_HOP attributes that cause the GoBGP daemon (gobgpd) to crash or become unresponsive, leading to a denial of service condition. This disrupts the routing process, potentially causing network outages or degraded performance. Exploitation does not require authentication, but the attacker must be able to send BGP messages to the target router or BGP speaker, which typically implies network-level access or compromised peers. The vulnerability was reserved and published in early March 2026, but no patches or exploits are currently documented. The lack of a CVSS score indicates that the vulnerability is newly disclosed and under evaluation. Given the critical role of BGP in internet routing, this vulnerability poses a significant risk to network stability and availability for organizations relying on GoBGP 4.2.0.

Potential Impact

The primary impact of CVE-2026-30405 is a denial of service on network devices running GoBGP 4.2.0, which can lead to loss of routing functionality and network outages. This can disrupt internet connectivity, degrade service quality, and cause cascading failures in dependent systems. Organizations such as ISPs, cloud providers, and enterprises using GoBGP for BGP routing are at risk of service interruptions. The vulnerability could be exploited to selectively disrupt traffic flows or cause widespread outages if leveraged against critical internet infrastructure. The lack of authentication requirement and the ability to trigger the DoS remotely increase the threat level. Although no known exploits exist yet, the potential for attackers to cause significant network disruption is high, especially in environments where GoBGP is deployed at scale or in critical routing roles.

Mitigation Recommendations

To mitigate CVE-2026-30405, organizations should first verify if they are running GoBGP version 4.2.0 and plan to upgrade to a patched version once available. In the absence of a patch, network administrators should implement strict BGP update filtering to block suspicious or malformed NEXT_HOP attributes from untrusted peers. Deploying prefix and attribute validation techniques such as RPKI (Resource Public Key Infrastructure) can help reduce the risk of malicious BGP updates. Monitoring BGP session stability and routing anomalies can provide early detection of exploitation attempts. Network segmentation and limiting BGP peering to trusted entities reduce exposure. Additionally, implementing rate limiting on BGP update messages and using control-plane protection features can help mitigate the impact of potential attacks. Coordination with upstream providers and sharing threat intelligence can further enhance defense.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-03-04T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b8316f9d4df4518370fe9f

Added to database: 3/16/2026, 4:35:59 PM

Last enriched: 3/16/2026, 4:51:04 PM

Last updated: 3/16/2026, 7:36:48 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses