Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5123: Off-by-One in osrg GoBGP

0
Medium
VulnerabilityCVE-2026-5123cvecve-2026-5123
Published: Mon Mar 30 2026 (03/30/2026, 15:15:14 UTC)
Source: CVE Database V5
Vendor/Project: osrg
Product: GoBGP

Description

A weakness has been identified in osrg GoBGP up to 4.3.0. This impacts the function DecodeFromBytes of the file pkg/packet/bgp/bgp.go. Executing a manipulation of the argument data[1] can lead to off-by-one. The attack may be launched remotely. Attacks of this nature are highly complex. The exploitability is said to be difficult. This patch is called 67c059413470df64bc20801c46f64058e88f800f. A patch should be applied to remediate this issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 16:08:43 UTC

Technical Analysis

CVE-2026-5123 is a medium-severity off-by-one vulnerability found in the osrg GoBGP project, specifically affecting versions 4.0 through 4.3.0. The vulnerability exists in the DecodeFromBytes function located in the pkg/packet/bgp/bgp.go source file. It is triggered by manipulation of the second byte (data[1]) of the input data, which causes an off-by-one error during packet decoding. This type of error can lead to memory corruption, potentially allowing an attacker to alter the program’s execution flow or cause unexpected behavior. The vulnerability can be exploited remotely without requiring authentication or user interaction, but the complexity of crafting a successful exploit is high due to the precise nature of the off-by-one condition and the internal workings of the BGP protocol parsing. The impact primarily concerns the integrity of the GoBGP daemon, which is a widely used open-source BGP implementation for routing in large-scale networks. The vulnerability does not directly compromise confidentiality or availability but could be leveraged as part of a broader attack chain. The patch identified by commit 67c059413470df64bc20801c46f64058e88f800f corrects the boundary check to prevent the off-by-one condition. No known active exploits have been reported, but the presence of this flaw in critical routing software necessitates prompt remediation to prevent potential future attacks.

Potential Impact

The primary impact of CVE-2026-5123 is on the integrity of network routing infrastructure that relies on GoBGP. Successful exploitation could lead to memory corruption within the GoBGP process, potentially allowing attackers to execute arbitrary code or cause denial of service through process crashes. Given GoBGP’s role in managing Border Gateway Protocol (BGP) sessions, exploitation could disrupt routing decisions or enable malicious route injection if combined with other vulnerabilities or misconfigurations. This could affect the stability and reliability of internet routing for affected organizations, leading to network outages or traffic interception. Although exploitation is complex and no active exploits are known, the widespread use of GoBGP in ISPs, cloud providers, and large enterprises means the potential impact is significant if attackers develop reliable exploits. The vulnerability does not require authentication, increasing the attack surface, but the high complexity reduces immediate risk. Organizations that do not patch may face increased risk of targeted attacks aiming to disrupt or manipulate BGP routing.

Mitigation Recommendations

To mitigate CVE-2026-5123, organizations should immediately apply the official patch identified by commit 67c059413470df64bc20801c46f64058e88f800f to all affected GoBGP versions (4.0 through 4.3.0). Network administrators should verify the GoBGP version in use and upgrade to a patched release or rebuild from source including the fix. Additionally, implement strict network segmentation and access controls to limit exposure of BGP daemons to untrusted networks, reducing the attack surface. Employ monitoring and anomaly detection on BGP session behavior to identify unusual routing updates or crashes that could indicate exploitation attempts. Regularly audit and update routing software dependencies and maintain an incident response plan for routing infrastructure compromise. Consider deploying BGP session authentication mechanisms such as TCP MD5 signatures or BGP TTL security to further harden BGP sessions. Finally, maintain up-to-date threat intelligence feeds to stay informed of any emerging exploits targeting this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-30T07:50:35.204Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ca9c6fe6bfc5ba1d4725b4

Added to database: 3/30/2026, 3:53:19 PM

Last enriched: 3/30/2026, 4:08:43 PM

Last updated: 3/31/2026, 4:08:51 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses