Cybersecurity researchers at Forescout Vedere Labs recently published a report revealing three new security vulnerabilities in version 8.4 of FRRouting (Free Range Routing). FRRouting (FRR) is an open-source implementation of BGP internet routing protocol suite used for Linux and Unix platforms. The new security flaws found in FRRouting could potentially lead to a denial-of-service (DoS) attack on vulnerable BGP peers, which could render them unresponsive.
BGP open-source implementation, FRRouting, is a gateway protocol used to exchange routing and reachability information between autonomous systems. Attackers could exploit these vulnerabilities to drop all BGP sessions and routing tables, resulting in a DoS condition on vulnerable BGP peers. Summary of new vulnerabilities:
FRRouting is currently used by various vendors such as NVIDIA Cumulus, DENT, and SONiC, which poses a supply chain risk. Forescout Vedere Labs discovered these vulnerabilities while analyzing seven different implementations of BGP, including FRRouting, BIRD, OpenBGPd, Mikrotik RouterOS, Juniper JunOS, Cisco IOS, and Arista EOS.
Forescout Vedere Labs created a Python-based open-source BGP Fuzzer tool to test the security of BGP suites used internally. The tool can also identify new vulnerabilities in BGP implementations. Patching network infrastructure devices as often as possible is recommended to mitigate the risk of vulnerable BGP implementations.
In conclusion, the discovery of these vulnerabilities highlights the importance of regular patching and testing of network infrastructure devices to prevent supply chain risks and potential cyberattacks. Organizations must take proactive measures to secure their networks and stay ahead of cyber threats. If you need expert help identifying, prioritizing, and remediating vulnerabilities in your network, consider Armoryze's risk-based vulnerability management services. Contact us today to schedule a consultation and protect your business from potential cyber threats.