CVE-2023-45886

7.5 HIGH

📋 TL;DR

This vulnerability in IP Infusion ZebOS BGP daemon allows remote attackers to cause denial of service by sending specially crafted BGP update messages with malformed attributes. It affects network devices running vulnerable versions of ZebOS that process BGP traffic. The attack can disrupt BGP routing and network connectivity.

💻 Affected Systems

Products:
  • IP Infusion ZebOS
Versions: Through 7.10.6
Operating Systems: Various (embedded in network devices)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects any system running ZebOS with BGP enabled and processing external BGP updates. Commonly found in routers, switches, and other network infrastructure.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete BGP daemon crash leading to routing table loss, network partition, and extended service disruption requiring manual intervention to restore.

🟠

Likely Case

BGP daemon crash causing temporary routing disruption until process restarts, potentially causing route flapping and packet loss.

🟢

If Mitigated

Limited impact with proper network segmentation and BGP session filtering, potentially causing only isolated session resets.

🌐 Internet-Facing: HIGH - BGP sessions are typically internet-facing and accept updates from external peers, making them directly exposed.
🏢 Internal Only: MEDIUM - Internal BGP sessions could also be exploited if attacker gains internal network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending malformed BGP update messages, which can be done with standard BGP tools. The vulnerability is in error handling of malformed attributes.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 7.10.6

Vendor Advisory: https://www.ipinfusion.com/doc_prod_cat/zebos/

Restart Required: Yes

Instructions:

1. Contact IP Infusion for updated ZebOS version. 2. Backup current configuration. 3. Install updated ZebOS software. 4. Restart BGP daemon or entire device. 5. Verify BGP sessions re-establish properly.

🔧 Temporary Workarounds

BGP Session Filtering

all

Implement BGP route filtering to reject updates from untrusted peers and limit accepted attributes

configure router bgp
neighbor <peer_ip> route-map FILTER_IN in
route-map FILTER_IN deny 10
match as-path 1
ip as-path access-list 1 deny .*

BGP Maximum Prefix Limiting

all

Limit number of prefixes accepted from peers to reduce attack surface

configure router bgp
neighbor <peer_ip> maximum-prefix 100

🧯 If You Can't Patch

  • Implement strict BGP peer authentication (MD5/TCP-AO) and only accept updates from trusted, authenticated peers
  • Deploy network monitoring with anomaly detection for BGP traffic patterns and implement rate limiting on BGP sessions

🔍 How to Verify

Check if Vulnerable:

Check ZebOS version: show version | include ZebOS. If version is 7.10.6 or earlier, system is vulnerable.

Check Version:

show version | include ZebOS

Verify Fix Applied:

Verify ZebOS version is later than 7.10.6 and monitor BGP daemon stability under normal traffic loads.

📡 Detection & Monitoring

Log Indicators:

  • BGP daemon crash logs
  • Unexpected BGP session resets
  • Error messages about malformed BGP attributes

Network Indicators:

  • Unusual BGP update patterns
  • Multiple BGP session resets from same peer
  • Malformed BGP attribute packets in captures

SIEM Query:

source="bgpd" AND ("crash" OR "restart" OR "malformed attribute")

🔗 References

📤 Share & Export