The BGP daemon (bgpd) in IP Infusion ZebOS through 7.10.6 allow remote attackers to cause a denial of service by sending crafted BGP update messages containing a malformed attribute.
References
Link | Resource |
---|---|
https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling | Exploit |
https://my.f5.com/manage/s/article/K000137315 | Third Party Advisory |
https://www.ipinfusion.com/doc_prod_cat/zebos/ | Product |
https://www.kb.cert.org/vuls/id/347067 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
No history.
Information
Published : 2023-11-21 06:15
Updated : 2023-11-29 17:09
NVD link : CVE-2023-45886
Mitre link : CVE-2023-45886
CVE.ORG link : CVE-2023-45886
JSON object : View
Products Affected
f5
- big-ip_local_traffic_manager
- big-ip_next_service_proxy_for_kubernetes
- big-ip_next_cloud-native_network_functions
- big-ip_next
- big-ip_global_traffic_manager
ipinfusion
- zebos
CWE