CVE-2025-43971
8.60.03%
GoBGP Panic: The Zero-Byte Assassin
Alon Barad
Software EngineerJan 12, 2026·6 min read·22 visits
PoC Available
Executive Summary (TL;DR)
GoBGP, a popular BGP implementation, crashes when parsing a specific optional capability in the BGP OPEN message. By setting the 'Software Version' length to zero, an attacker forces a slice bounds out of range panic (data[1:0]). This requires no authentication if the attacker can reach the BGP port, resulting in a complete teardown of BGP sessions and potential routing outages. Fixed in version 3.35.0.
A critical Denial of Service (DoS) vulnerability in GoBGP allows remote attackers to crash the BGP daemon by sending a malformed BGP OPEN message. The crash is triggered by a Go runtime panic due to an improper slice operation when parsing the Software Version capability.
Official Patches
Fix Analysis (1)
Technical Appendix
CVSS Score
8.6/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:HEPSS Probability
0.03%
Top 93% most exploited
Affected Systems
GoBGP < 3.35.0
Affected Versions Detail
| Product | Affected Versions | Fixed Version |
|---|---|---|
GoBGP OSRG | < 3.35.0 | 3.35.0 |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-129 |
| Attack Vector | Network |
| CVSS Score | 8.6 (High) |
| EPSS Score | 0.00026 |
| Impact | Denial of Service (DoS) |
| Exploit Status | PoC Available |
MITRE ATT&CK Mapping
CWE-129
Improper Validation of Array Index
Improper Validation of Array Index
Known Exploits & Detection
Vulnerability Timeline
Fix committed to GitHub
2025-02-07
CVE Published
2025-04-21