CVE-2023-3748
low-risk
Published 2023-07-24
A flaw was found in FRRouting when parsing certain babeld unicast hello messages that are intended to be ignored. This issue may allow an attacker to send specially crafted hello messages with the unicast flag set, the interval field set to 0, or any TLV that contains a sub-TLV with the Mandatory flag set to enter an infinite loop and cause a denial of service.
Do I need to act?
-
0.07% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.5/10
Low
ADJACENT_NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (4)
Third Party Advisory
https://access.redhat.com/security/cve/CVE-2023-3748
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=2223668
Third Party Advisory
https://access.redhat.com/security/cve/CVE-2023-3748
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=2223668
18
/ 100
low-risk
Severity
13/34 · Low
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal