CVE-2023-38802
Alma Linux vulnerability analysis and mitigation

Overview

CVE-2023-38802 is a denial-of-service (DoS) vulnerability discovered in BGP software implementations, specifically affecting FRRouting FRR versions 7.5.1 through 9.0 and Pica8 PICOS 4.3.3.2. The vulnerability was discovered by Ben Cartwright-Cox and disclosed in September 2023. The issue affects devices and appliances configured with BGP routing features enabled, allowing a remote attacker to cause session resets through an invalid BGP update with a corrupted attribute 23 (Tunnel Encapsulation) (Palo Alto Networks, NVD).

Technical details

The vulnerability exists in the BGP implementation's handling of attribute 23 (Tunnel Encapsulation). When a corrupted version of this attribute is received, affected systems will incorrectly reset network sessions instead of properly handling the invalid data. The issue has been assigned a CVSS v3.1 base score of 7.5 HIGH, with attack vector being network-based (AV:N), low attack complexity (AC:L), requiring no privileges (PR:N), and no user interaction (UI:N) (NVD).

Impact

When exploited, this vulnerability can cause a denial-of-service condition by forcing BGP sessions to reset, potentially disrupting network connectivity. The impact is particularly severe for devices providing wider internet access, as session resets can result in network outages. The DoS condition can be persistent, as the session will reset again when reconnection is attempted if the malicious route is still present (Benjojo Blog).

Mitigation and workarounds

The vulnerability has been fixed in various software versions including FRR 8.5.3 and PAN-OS versions 8.1.26, 9.0.17-h4, 9.1.16-h3, 10.1.11, 10.2.6, and 11.0.3. A temporary workaround involves inserting an unaffected BGP router configured to drop invalid BGP updates between the attacker-originated BGP update and affected devices. This prevents the invalid BGP update from reaching the vulnerable router (Palo Alto Networks, Debian Security).

Community reactions

The discovery sparked significant discussion in the network security community. The researcher who discovered the vulnerability, Ben Cartwright-Cox, noted poor vendor responses to the disclosure, with only OpenBSD's security team providing a rapid acknowledgment and patch. Several major ISPs, a large CDN, and two 'Tier 1' networks have applied configuration changes to prevent these issues from impacting their operations (Benjojo Blog).

Additional resources


SourceThis report was generated using AI

Related Alma Linux vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-24528HIGH7.1
  • KerberosKerberos
  • krb5-pkinit-openssl
NoYesJan 16, 2026
CVE-2025-68973HIGH7
  • NixOSNixOS
  • gnupg2-utils
NoYesDec 28, 2025
CVE-2025-61594LOW2.7
  • RubyRuby
  • ruby-libs
NoYesDec 30, 2025
CVE-2023-54286N/AN/A
  • Linux KernelLinux Kernel
  • kernel-rt-debug-modules-internal
NoYesDec 30, 2025
CVE-2022-50881N/AN/A
  • Linux KernelLinux Kernel
  • kernel-abi-whitelists
NoYesDec 30, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management