Security

Researchers found DoS flaws in popular BGP implementation

Vulnerabilities in a software implementation of the Border Gateway Protocol (BGP) that could be weaponized to trigger a DoS condition on BGP peers.

Forescout Vedere Labs researchers discovered multiple vulnerabilities in the software implementation of the Border Gateway Protocol (BGP). The issues reside in the BGP message parsing in version 8.4 of FRRouting implementation, a leading open-source implementation of the protocol. The flaw can be exploited to trigger a denial of service (DoS) condition on vulnerable BGP peers.

Technically the flaws can be exploited to drop all BGP sessions and routing tables, rendering the peer unresponsive.

The researchers pointed out that Border Gateway Protocol implementations are widely adopted, common uses include traffic routing in large data centers and BGP extensions, such as MP-BGP, or for MPLS L3 VPNs.

The FRRouting implementation is currently used in the networking solutions of several major vendors, including nVidia Cumulus, DENT, and SONiC.

“Attackers may leverage any of the three new vulnerabilities to achieve a DoS on a vulnerable BGP peer, thus dropping all BGP sessions and routing tables and rendering the peer unresponsive for several seconds. The DoS condition may be prolonged indefinitely by repeatedly sending malformed packets.” reads the advisory published by the company.

The discovery is the result of a broader analysis of seven popular Border Gateway Protocol implementations, three open-source (FRRoutingBIRDOpenBGPd) and four closed source (Mikrotik RouterOSJuniper JunOSCisco IOSArista EOS).

Below is the list of the flaws discovered by Forescout:

CVE IDDescriptionCVSSv3.1Potential Impact
CVE-2022-40302Out-of-bounds read when processing a malformed BGP OPEN message with an Extended Optional Parameters Length option.6.5DoS
CVE-2022-40318Out-of-bounds read when processing a malformed BGP OPEN message with an Extended Optional Parameters Length option. This is a different issue from CVE-2022-40302.6.5DoS
CVE-2022-43681Out-of-bounds read when processing a malformed BGP OPEN message that abruptly ends with the option length octet (or the option length word, in case of OPEN with extended option lengths message).6.5DoS

The researchers pointed out that the flaws CVE-2022-40302 and CVE-2022-43681 can be triggered before FRRouting validates BGP Identifier and ASN fields. While FRRouting only allows connections between configured peers by default (e.g., OPEN messages from hosts not present in the config files will not be accepted), in the attack scenario described in the advisory, threat actors can spoof a valid IP address of a trusted peer. Threat actors can also take advantage of misconfigurations or attempt to compromise a legitimate peer by exploiting other vulnerabilities.

It has been estimated that there are over 330,000 hosts with BGP enabled on the internet and approximately 1,000 of them replies to unsolicited BGP OPEN messages. Most of the Border Gateway Protocol hosts are in China (close to 100,000), the US (50,000) and the UK (16,000). The experts discovered more than 1,000 hosts running FRRouting, but not all of them have Border Gateway Protocol enabled. Again.

The vulnerabilities were addressed by the FRRouting team with the release of the following versions:

“Our research shows that modern BGP implementations still have low-hanging fruit that can be abused by attackers.” concludes the advisory.

Forescout also released a Python-based open-source fuzzer tool that allows organizations to test the security of the Border Gateway Protocol suites used internally and find new vulnerabilities in Border Gateway Protocol implementations.

We are in the final!

Please vote for Security Affairs (https://securityaffairs.com/) as the best European Cybersecurity Blogger Awards 2022 – VOTE FOR YOUR WINNERS
Vote for me in the sections where is reported Securityaffairs or my name Pierluigi Paganini

Please nominate Security Affairs as your favorite blog.

Nominate Pierluigi Paganini and Security Affairs here here: 

https://docs.google.com/forms/d/e/1FAIpQLSepvnj8b7QzMdLh7vWEDQDqohjBUsHyn3x3xRdYGCetwVy2DA/viewform

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Border Gateway Protocol)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

MITRE revealed that nation-state actors breached its systems via Ivanti zero-days

The MITRE Corporation revealed that a nation-state actor compromised its systems in January 2024 by…

15 hours ago

FBI chief says China is preparing to attack US critical infrastructure

China-linked threat actors are preparing cyber attacks against U.S. critical infrastructure warned FBI Director Christopher…

1 day ago

United Nations Development Programme (UNDP) investigates data breach

The United Nations Development Programme (UNDP) has initiated an investigation into an alleged ransomware attack…

1 day ago

FIN7 targeted a large U.S. carmaker with phishing attacks

BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…

2 days ago

Law enforcement operation dismantled phishing-as-a-service platform LabHost

An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…

2 days ago

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

2 days ago

This website uses cookies.