Platform
linux
Component
frr
Fixed in
10.5.1
10.5.2
CVE-2026-5107 describes an improper access control vulnerability within the EVPN Type-2 Route Handler of FRRouting FRR. This flaw allows for remote attackers to potentially gain unauthorized access due to insufficient access controls. The vulnerability affects FRRouting FRR versions 10.5.0 through 10.5.1. A patch is available with identifier 7676cad65114aa23adde583d91d9d29e2debd045 to address this issue.
A vulnerability has been identified in FRRouting (FRR) versions up to 10.5.1. This flaw, cataloged as CVE-2026-5107, resides within the processtype2route function of the bgpd/bgp_evpn.c file, specifically in the EVPN Type-2 Route Handler. A remote attacker could exploit this weakness to gain unauthorized access to system resources or functionalities. While the attack complexity is considered high and exploitation difficult, the potential impact on network security is significant, particularly in environments reliant on FRR for BGP routing and EVPN network management. The current absence of an official fix necessitates a careful risk assessment and the implementation of temporary mitigation measures.
The CVE-2026-5107 vulnerability in FRR is exploited through manipulation of the processtype2route function within the EVPN Type-2 Route Handler. A remote attacker can send specially crafted packets to trigger this manipulation, leading to improper access controls. The attack complexity suggests a deep understanding of BGP and EVPN protocols, as well as the ability to create malicious packets. The difficulty of exploitation implies that identifying and leveraging this vulnerability could be challenging, but the potential risk justifies proactive attention and mitigation. The lack of a KEV (Kernel Exploitability Vulnerability) indicates the vulnerability is not considered high priority in terms of widespread exploitation.
Exploit Status
EPSS
0.05% (15% percentile)
CISA SSVC
CVSS Vector
Currently, no official patch is available for CVE-2026-5107. We strongly recommend upgrading to the latest stable version of FRR as soon as it becomes available. In the interim, implementing additional security measures is advised, such as network segmentation, strengthened access controls, and thorough monitoring of network traffic for suspicious activity. Reviewing the code (commit 7676cad65114aa23adde583d91d9d29e2debd045) may provide further insight into the vulnerability's nature and facilitate the development of customized mitigation strategies. Staying informed about FRR security advisories is crucial for responding promptly to any released solutions.
It is recommended to apply the provided patch (7676cad65114aa23adde583d91d9d29e2debd045) to correct the access control vulnerability in the EVPN Type-2 Route Handler. Update FRRouting FRR to a version later than 10.5.1 that includes this patch.
Vulnerability analysis and critical alerts directly to your inbox.
FRR (FRRouting) is an open-source routing suite that implements various routing protocols, including BGP and OSPF.
CVE-2026-5107 is a unique identifier for this specific vulnerability in FRR.
Upgrade to the latest version of FRR as soon as it's available. In the meantime, implement mitigation measures like network segmentation and monitoring.
Currently, no official patch is available. Stay tuned for FRR security advisories.
It's a component of FRR that handles type 2 routes in EVPN (Ethernet VPN) networks.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.