{"id":163325,"date":"2023-05-04T13:24:57","date_gmt":"2023-05-04T18:24:57","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2023\/05\/researchers-uncover-new-bgp-flaws-in-popular-internet-routing-protocol-software"},"modified":"2023-05-04T13:24:57","modified_gmt":"2023-05-04T18:24:57","slug":"researchers-uncover-new-bgp-flaws-in-popular-internet-routing-protocol-software","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2023\/05\/researchers-uncover-new-bgp-flaws-in-popular-internet-routing-protocol-software","title":{"rendered":"Researchers Uncover New BGP Flaws in Popular Internet Routing Protocol Software"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/researchers-uncover-new-bgp-flaws-in-popular-internet-routing-protocol-software2.jpg\"><\/a><\/p>\n<p>Cybersecurity researchers have uncovered weaknesses in a software implementation of the Border Gateway Protocol (BGP) that could be weaponized to achieve a denial-of-service (DoS) condition on vulnerable BGP peers.<\/p>\n<p>The three vulnerabilities reside in version 8.4 of <a href=\"https:\/\/github.com\/FRRouting\/frr\" rel=\"noopener\" target=\"_blank\">FRRouting<\/a>, a popular open source internet routing protocol suite for Linux and Unix platforms. It\u2019s currently used by several vendors like <a href=\"https:\/\/www.nvidia.com\/en-us\/networking\/ethernet-switching\/cumulus-linux\/\" rel=\"noopener\" target=\"_blank\">NVIDIA Cumulus<\/a>, <a href=\"https:\/\/dent.dev\/\" rel=\"noopener\" target=\"_blank\">DENT<\/a>, and <a href=\"https:\/\/sonic-net.github.io\/SONiC\/\" rel=\"noopener\" target=\"_blank\">SONiC<\/a>, posing supply chain risks.<\/p>\n<p>The discovery is the result of an analysis of seven different implementations of BGP carried out by Forescout Vedere Labs: FRRouting, BIRD, OpenBGPd, Mikrotik RouterOS, Juniper JunOS, Cisco IOS, and Arista EOS.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity researchers have uncovered weaknesses in a software implementation of the Border Gateway Protocol (BGP) that could be weaponized to achieve a denial-of-service (DoS) condition on vulnerable BGP peers. The three vulnerabilities reside in version 8.4 of FRRouting, a popular open source internet routing protocol suite for Linux and Unix platforms. It\u2019s currently used by [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,418],"tags":[],"class_list":["post-163325","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-internet"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/163325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=163325"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/163325\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=163325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=163325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=163325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}