


Perceptive Security
SOC/SIEM Consultancy

A vulnerability was found in osrg GoBGP up to 4.3.0. Affected is the function PathAttributeAigp.DecodeFromBytes of the file pkg/packet/bgp/bgp.go of the compone…
Published:
3 mei 2026 om 22:00:00
Alert date:
4 mei 2026 om 07:01:11
Source:
nvd.nist.gov
Network Infrastructure
A buffer overflow vulnerability (CVE-2026-7735) was discovered in osrg GoBGP versions up to 4.3.0. The vulnerability affects the PathAttributeAigp.DecodeFromBytes function in the AIGP Attribute Parser component. An attacker can remotely exploit this vulnerability by manipulating BGP packets, potentially leading to system compromise. The vulnerability is located in the pkg/packet/bgp/bgp.go file and can be triggered through remote attacks. A patch is available in version 4.4.0 with commit 51ad1ada06cb41ce47b7066799981816f50b7ced. Organizations using affected versions should upgrade immediately to mitigate this security risk.
Technical details
Mitigation steps:
Affected products:
osrg GoBGP
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-7735
https://github.com/osrg/gobgp/
https://github.com/osrg/gobgp/commit/51ad1ada06cb41ce47b7066799981816f50b7ced
https://github.com/osrg/gobgp/releases/tag/v4.4.0
https://vuldb.com/submit/807600
https://vuldb.com/vuln/360910
https://vuldb.com/vuln/360910/cti
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
