Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 08 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:osrg:gobgp:*:*:*:*:*:*:*:* |
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Osrg
Osrg gobgp |
|
| Vendors & Products |
Osrg
Osrg gobgp |
Mon, 30 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security flaw has been discovered in osrg GoBGP up to 4.3.0. This affects the function DecodeFromBytes of the file pkg/packet/bgp/bgp.go of the component BGP OPEN Message Handler. Performing a manipulation of the argument domainNameLen results in improper access controls. The attack may be initiated remotely. A high degree of complexity is needed for the attack. The exploitability is reported as difficult. The patch is named 2b09db390a3d455808363c53e409afe6b1b86d2d. It is suggested to install a patch to address this issue. | |
| Title | osrg GoBGP BGP OPEN Message bgp.go DecodeFromBytes access control | |
| Weaknesses | CWE-266 CWE-284 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-30T16:38:44.520Z
Reserved: 2026-03-30T07:46:42.677Z
Link: CVE-2026-5122
Updated: 2026-03-30T16:38:35.561Z
Status : Analyzed
Published: 2026-03-30T15:16:35.947
Modified: 2026-04-08T16:07:36.650
Link: CVE-2026-5122
No data.
OpenCVE Enrichment
Updated: 2026-04-08T20:00:36Z