Security

Researchers found DoS flaws in popular BGP implementation

Vulnerabilities in a software implementation of the Border Gateway Protocol (BGP) that could be weaponized to trigger a DoS condition on BGP peers.

Forescout Vedere Labs researchers discovered multiple vulnerabilities in the software implementation of the Border Gateway Protocol (BGP). The issues reside in the BGP message parsing in version 8.4 of FRRouting implementation, a leading open-source implementation of the protocol. The flaw can be exploited to trigger a denial of service (DoS) condition on vulnerable BGP peers.

Technically the flaws can be exploited to drop all BGP sessions and routing tables, rendering the peer unresponsive.

The researchers pointed out that Border Gateway Protocol implementations are widely adopted, common uses include traffic routing in large data centers and BGP extensions, such as MP-BGP, or for MPLS L3 VPNs.

The FRRouting implementation is currently used in the networking solutions of several major vendors, including nVidia Cumulus, DENT, and SONiC.

“Attackers may leverage any of the three new vulnerabilities to achieve a DoS on a vulnerable BGP peer, thus dropping all BGP sessions and routing tables and rendering the peer unresponsive for several seconds. The DoS condition may be prolonged indefinitely by repeatedly sending malformed packets.” reads the advisory published by the company.

The discovery is the result of a broader analysis of seven popular Border Gateway Protocol implementations, three open-source (FRRoutingBIRDOpenBGPd) and four closed source (Mikrotik RouterOSJuniper JunOSCisco IOSArista EOS).

Below is the list of the flaws discovered by Forescout:

CVE IDDescriptionCVSSv3.1Potential Impact
CVE-2022-40302Out-of-bounds read when processing a malformed BGP OPEN message with an Extended Optional Parameters Length option.6.5DoS
CVE-2022-40318Out-of-bounds read when processing a malformed BGP OPEN message with an Extended Optional Parameters Length option. This is a different issue from CVE-2022-40302.6.5DoS
CVE-2022-43681Out-of-bounds read when processing a malformed BGP OPEN message that abruptly ends with the option length octet (or the option length word, in case of OPEN with extended option lengths message).6.5DoS

The researchers pointed out that the flaws CVE-2022-40302 and CVE-2022-43681 can be triggered before FRRouting validates BGP Identifier and ASN fields. While FRRouting only allows connections between configured peers by default (e.g., OPEN messages from hosts not present in the config files will not be accepted), in the attack scenario described in the advisory, threat actors can spoof a valid IP address of a trusted peer. Threat actors can also take advantage of misconfigurations or attempt to compromise a legitimate peer by exploiting other vulnerabilities.

It has been estimated that there are over 330,000 hosts with BGP enabled on the internet and approximately 1,000 of them replies to unsolicited BGP OPEN messages. Most of the Border Gateway Protocol hosts are in China (close to 100,000), the US (50,000) and the UK (16,000). The experts discovered more than 1,000 hosts running FRRouting, but not all of them have Border Gateway Protocol enabled. Again.

The vulnerabilities were addressed by the FRRouting team with the release of the following versions:

“Our research shows that modern BGP implementations still have low-hanging fruit that can be abused by attackers.” concludes the advisory.

Forescout also released a Python-based open-source fuzzer tool that allows organizations to test the security of the Border Gateway Protocol suites used internally and find new vulnerabilities in Border Gateway Protocol implementations.

We are in the final!

Please vote for Security Affairs (https://securityaffairs.com/) as the best European Cybersecurity Blogger Awards 2022 – VOTE FOR YOUR WINNERS
Vote for me in the sections where is reported Securityaffairs or my name Pierluigi Paganini

Please nominate Security Affairs as your favorite blog.

Nominate Pierluigi Paganini and Security Affairs here here: 

https://docs.google.com/forms/d/e/1FAIpQLSepvnj8b7QzMdLh7vWEDQDqohjBUsHyn3x3xRdYGCetwVy2DA/viewform

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Border Gateway Protocol)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 45

Security Affairs Malware newsletter includes a collection of the best articles and research on malware…

18 hours ago

Security Affairs newsletter Round 524 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles…

18 hours ago

Experts found rogue devices, including hidden cellular radios, in Chinese-made power inverters used worldwide

Chinese "kill switches" found in Chinese-made power inverters in US solar farm equipment that could…

21 hours ago

US Government officials targeted with texts and AI-generated deepfake voice messages impersonating senior U.S. officials

FBI warns ex-officials are targeted with deepfake texts and AI voice messages impersonating senior U.S.…

2 days ago

Shields up US retailers. Scattered Spider threat actors can target them

Google warns that the cybercrime group Scattered Spider behind UK retailer attacks is now targeting…

2 days ago

U.S. CISA adds Google Chromium, DrayTek routers, and SAP NetWeaver flaws to its Known Exploited Vulnerabilities catalog<gwmw style="display:none;"></gwmw>

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Google Chromium, DrayTek routers, and SAP NetWeaver…

2 days ago