CVE-2026-37461: n/a
An out-of-bounds read in the ParseIP6Extended function (/bgp/bgp.go) of gobgp v4.3.0 allows attackers to cause a Denial of Service (DoS) via supplying a crafted BGP UPDATE message.
AI Analysis
Technical Summary
An out-of-bounds read vulnerability exists in the ParseIP6Extended function of gobgp v4.3.0, specifically in the bgp.go source file. This vulnerability can be exploited by sending a crafted BGP UPDATE message, causing the software to crash or become unresponsive, leading to a Denial of Service. The vulnerability is publicly disclosed but lacks a CVSS score and official remediation details. No exploits are currently known to be active in the wild.
Potential Impact
Successful exploitation of this vulnerability results in a Denial of Service condition on the affected gobgp instance, potentially disrupting BGP routing operations. There is no evidence of code execution or data leakage. The impact is limited to service availability degradation or interruption.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, consider applying network-level protections to filter or validate BGP UPDATE messages from untrusted sources to reduce exposure.
CVE-2026-37461: n/a
Description
An out-of-bounds read in the ParseIP6Extended function (/bgp/bgp.go) of gobgp v4.3.0 allows attackers to cause a Denial of Service (DoS) via supplying a crafted BGP UPDATE message.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
An out-of-bounds read vulnerability exists in the ParseIP6Extended function of gobgp v4.3.0, specifically in the bgp.go source file. This vulnerability can be exploited by sending a crafted BGP UPDATE message, causing the software to crash or become unresponsive, leading to a Denial of Service. The vulnerability is publicly disclosed but lacks a CVSS score and official remediation details. No exploits are currently known to be active in the wild.
Potential Impact
Successful exploitation of this vulnerability results in a Denial of Service condition on the affected gobgp instance, potentially disrupting BGP routing operations. There is no evidence of code execution or data leakage. The impact is limited to service availability degradation or interruption.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, consider applying network-level protections to filter or validate BGP UPDATE messages from untrusted sources to reduce exposure.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-04-06T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69f8cb08cbff5d86103668ac
Added to database: 5/4/2026, 4:36:24 PM
Last enriched: 5/4/2026, 4:52:13 PM
Last updated: 5/5/2026, 5:58:06 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.