A security flaw has been discovered in osrg GoBGP up to 4.3.0. This affects the function DecodeFromBytes of the file pkg/packet/bgp/bgp.go of the component BGP OPEN Message Handler. Performing a manipulation of the argument domainNameLen results in improper access controls. The attack may be initiated remotely. A high degree of complexity is needed for the attack. The exploitability is reported as difficult. The patch is named 2b09db390a3d455808363c53e409afe6b1b86d2d. It is suggested to install a patch to address this issue.
Cite this page
CVE-2026-5122. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2026-5122
Use CWE-266, Osrg vendor hub and Gobgp product page to widen CVE-2026-5122 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-43971, CVE-2026-30405 and CVE-2025-43973 for nearby disclosures in the same product family.