Skip to main content

CVE-2025-43973

CVE Details

Visit the official vulnerability details page for CVE-2025-43973 to learn more.

Initial Publication

04/22/2025

Last Update

08/22/2025

Third Party Dependency

github.com/osrg/gobgp/v3

NIST CVE Summary

An issue was discovered in GoBGP before 3.35.0. pkg/packet/rtr/rtr.go does not verify that the input length corresponds to a situation in which all bytes are available for an RTR message.

CVE Severity

9.8

Our Official Summary

This is a critical vulnerability identified in GoBGP versions prior to 3.35.0. The vulnerability stems from the lack of appropriate length verification in the RTR message parsing functionality. In order to exploit this vulnerability, attacker will need to gain access to the kubernetes cluster running the 3rd party images. The risk of exploitation is low as this requires an authenticated user with escalated privileges. Impact of exploitation is low as the attack surface is restricted to the container. Go version will be upgraded to fix the vulnerabilities.

Status

Ongoing

Affected Products & Versions

VersionPalette EnterprisePalette Enterprise AirgapVerteXVerteX Airgap
4.7.16⚠️ Impacted✅ No Impact⚠️ Impacted⚠️ Impacted
4.6.41⚠️ Impacted⚠️ Impacted⚠️ Impacted⚠️ Impacted

Revision History

DateRevision
05/15/2025Advisory severity revised to CRITICAL from
05/15/2025Status changed from Open to Ongoing