CVE-2026-42285: Critical GoBGP Flaw Allows Remote Crash via Malformed UPDATE

CVE-2026-42285: Critical GoBGP Flaw Allows Remote Crash via Malformed UPDATE

The National Vulnerability Database has identified CVE-2026-42285, a critical vulnerability in GoBGP, an open-source BGP implementation. Version 4.4.0 is susceptible to a nil pointer dereference when processing a BGP UPDATE message with inconsistent attribute lengths. This flaw allows an unauthenticated remote BGP peer to trigger a fatal panic, causing the entire GoBGP process to crash and resulting in a complete denial of service. The issue has been patched in version 4.5.0.

This vulnerability, rated HIGH with a CVSS score of 7.5, presents a significant risk to network infrastructure relying on GoBGP for routing. Attackers can exploit this to disrupt BGP peering sessions, leading to widespread connectivity issues. The ease of exploitation (AV:N/AC:L/PR:N/UI:N) makes it a prime target for disruption or denial-of-service attacks against networks that haven’t updated their GoBGP instances.

What This Means For You

  • If your organization uses GoBGP, immediately verify that you are running version 4.5.0 or later. If you are on an affected version, plan an urgent upgrade to mitigate the risk of a remote denial-of-service attack that could cripple your network connectivity.

Related ATT&CK Techniques

🛡️ Detection Rules

1 rule · 6 SIEM formats

1 detection rule auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1190 Initial Access

CVE-2026-42285: GoBGP Malformed UPDATE causing Nil Pointer Dereference

Sigma YAML — free preview
title: CVE-2026-42285: GoBGP Malformed UPDATE causing Nil Pointer Dereference
id: scw-2026-05-07-ai-1
status: experimental
level: critical
description: |
  This rule detects potential exploitation attempts targeting CVE-2026-42285. It looks for network traffic directed to the BGP port (179) from any source IP. The vulnerability allows an unauthenticated remote BGP peer to trigger a denial-of-service by sending a malformed BGP UPDATE message, causing GoBGP to crash. While this rule specifically targets the network vector (port 179), a more precise detection would require analyzing the BGP UPDATE message content for inconsistent attribute lengths, which is not directly supported by the provided log source categories and fields. This rule serves as a high-level indicator for potential exploitation attempts on the BGP service.
author: SCW Feed Engine (AI-generated)
date: 2026-05-07
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-42285/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: firewall
detection:
  selection:
      dst_port:
          - '179'
      src_ip:
          - '0.0.0.0/0'
      dst_ip:
          - '0.0.0.0/0'
  selection_indicators:
      # This is a placeholder for a specific malformed BGP UPDATE message pattern.
      # In a real-world scenario, you would need to analyze network traffic
      # or exploit details to identify specific byte sequences or attribute length anomalies.
      # For demonstration, we'll use a hypothetical indicator.
      # Example: Detecting a specific sequence that might indicate inconsistent attribute lengths.
      # This would require deep packet inspection capabilities and specific signatures.
      # For a firewall log, this might be a custom payload signature if supported.
      # If firewall logs do not support deep packet inspection for BGP attributes, this rule might be less effective.
      # A more realistic approach might involve IDS/IPS logs if available and integrated.
      # Assuming a hypothetical field 'bgp_update_payload' for demonstration:
      # bgp_update_payload|contains:
      #     - 'SPECIFIC_MALFORMED_UPDATE_PATTERN'
      # Since we are limited to the provided fields, and BGP traffic is typically on port 179,
      # we will focus on the port and assume that if a crash occurs, it's due to a malformed packet.
      # Without specific payload indicators in the provided fields, this rule is indicative.
      # A more robust detection would require network traffic analysis tools.
      # For the purpose of this exercise, we'll assume that any BGP traffic (port 179) from an unauthenticated peer
      # that leads to a crash (which is not directly logged by firewall but inferred from system logs)
      # is a potential indicator. This rule is therefore a baseline.
      # A more specific rule would require access to BGP-level logs or IDS/IPS signatures.
      # Given the constraints, we focus on the network vector to the BGP port.
      # The actual detection of the malformed packet requires more specific log sources/fields.
      # This rule is a proxy for detecting potential exploitation attempts on the BGP port.
      # A more accurate rule would need to inspect the BGP UPDATE message content.
      # For now, we'll use a broad indicator on port 179, assuming subsequent system logs would confirm the crash.
      # If 'action' field is available and logs successful connection attempts to port 179:
      action|contains:
          - 'ALLOW'
  condition: selection AND selection_indicators
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-42285 DoS GoBGP version 4.4.0
CVE-2026-42285 DoS Unauthenticated remote BGP peer sending specially crafted BGP UPDATE message
CVE-2026-42285 DoS Nil pointer dereference in AdjRib.Update function
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 07, 2026 at 15:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

DivvyDrive XSS Vulnerability (CVE-2026-6002) Poses High Risk

CVE-2026-6002 — Improper neutralization of Script-Related HTML tags in a web page (basic XSS) vulnerability in DivvyDrive Information Technologies Inc. DivvyDrive allows Cross-Site Scripting (XSS)....

vulnerabilityCVEhigh-severitycross-site-scripting-xsscwe-80
/SCW Vulnerability Desk /HIGH /8.8 /⚑ 3 IOCs /⚙ 2 Sigma

DivvyDrive Critical CSRF Vulnerability: CVE-2026-5791 Poses Remote Attack Risk

CVE-2026-5791 — Cross-Site request forgery (CSRF) vulnerability in DivvyDrive Information Technologies Inc. DivvyDrive allows Cross Site Request Forgery. This issue affects DivvyDrive: from 4.8.2.9 before...

vulnerabilityCVEcriticalhigh-severitycwe-352
/SCW Vulnerability Desk /CRITICAL /9.6 /⚑ 2 IOCs

DivvyDrive Stored XSS Vulnerability (CVE-2026-5784) Poses High Risk

CVE-2026-5784 — Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in DivvyDrive Information Technologies Inc. DivvyDrive allows Stored XSS. This issue affects...

vulnerabilityCVEhigh-severitycross-site-scripting-xsscwe-79
/SCW Vulnerability Desk /HIGH /8.8 /⚑ 4 IOCs