CVE-2026-5123
low-risk
Published 2026-03-30
A weakness has been identified in osrg GoBGP up to 4.3.0. This impacts the function DecodeFromBytes of the file pkg/packet/bgp/bgp.go. Executing a manipulation of the argument data[1] can lead to off-by-one. The attack may be launched remotely. Attacks of this nature are highly complex. The exploitability is said to be difficult. This patch is called 67c059413470df64bc20801c46f64058e88f800f. A patch should be applied to remediate this issue.
Do I need to act?
-
0.09% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.7/10
Low
NETWORK
/ HIGH complexity
Affected Products (1)
Gobgp
Affected Vendors
References (6)
Product
https://github.com/osrg/gobgp/
Issue Tracking
https://github.com/osrg/gobgp/pull/3342
Third Party Advisory
https://vuldb.com/submit/780179
Third Party Advisory
https://vuldb.com/vuln/354155
Permissions Required
https://vuldb.com/vuln/354155/cti
18
/ 100
low-risk
Severity
13/34 · Low
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal