Medium severity6.5NVD Advisory· Published May 4, 2026· Updated May 11, 2026
CVE-2026-37458
CVE-2026-37458
Description
Missing input validation in the MP_REACH_NLRI component of FRRouting (FRR) stable/10.0 to stable/10.6 allows authenticated attackers to cause a Denial of Service (DoS) via supplying a crafted UPDATE message.
Affected products
1Patches
18102a8aeceb9bgpd: Validate MP_REACH_NLRI attribute against incorrect next-hop
1 file changed · +11 −0
bgpd/bgp_attr.c+11 −0 modified@@ -2747,6 +2747,17 @@ int bgp_mp_reach_parse(struct bgp_attr_parser_args *args, fallthrough; case BGP_ATTR_NHLEN_IPV4: stream_get(&attr->mp_nexthop_global_in, s, IPV4_MAX_BYTELEN); + + /* We do already the same validation for NEXT_HOP attribute, + * so let's do it here as well for consistency and to avoid potential + * security issues with martian addresses in MP_REACH_NLRI. + */ + if (ipv4_martian(&attr->mp_nexthop_global_in) && !peer->bgp->allow_martian) { + zlog_warn("%s sent martian nexthop %pI4 in MP_REACH_NLRI", peer->host, + &attr->mp_nexthop_global_in); + return BGP_ATTR_PARSE_WITHDRAW; + } + /* Probably needed for RFC 2283 */ if (attr->nexthop.s_addr == INADDR_ANY) memcpy(&attr->nexthop.s_addr,
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
1- Patch Tuesday - May 2026Rapid7 Blog · May 13, 2026