CVE-2026-7735

osrg · GoBGP

A security vulnerability has been identified in the osrg GoBGP software, potentially allowing for unexpected behavior or unauthorized access.

Executive summary

A high-severity vulnerability in osrg GoBGP poses a significant risk to network routing infrastructure and requires immediate investigation and patching.

Vulnerability

A vulnerability was identified in GoBGP versions up to 4. While specific technical details are limited, users should refer to official vendor advisories to understand the nature of the flaw.

Business impact

With a CVSS score of 7.3, this vulnerability could potentially lead to routing instability or unauthorized access to network control planes. Given the critical role of BGP in network infrastructure, the impact of a successful exploit could be severe, including service disruption or traffic redirection.

Remediation

Immediate Action: Apply the latest security updates provided by the osrg project or the relevant distribution maintainers.

Proactive Monitoring: Monitor BGP peering logs for anomalous entries or unexpected session resets and review routing tables for unauthorized changes.

Compensating Controls: Implement strict BGP filtering (prefix lists/route maps) and ensure control plane protection (e.g., TTL security, ACLs) is active for all BGP-speaking devices.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Organizations utilizing GoBGP must prioritize reviewing vendor security advisories and applying the latest patches to maintain the integrity of their network routing infrastructure.