Headline
CVE-2022-43681: Forescout – Automated Cybersecurity Across Your Digital Terrain
An out-of-bounds read exists in the BGP daemon of FRRouting FRR through 8.4. When sending a malformed BGP OPEN message that ends with the option length octet (or the option length word, in case of an extended OPEN message), the FRR code reads of out of the bounds of the packet, throwing a SIGABRT signal and exiting. This results in a bgpd daemon restart, causing a Denial-of-Service condition.
Map and protect all assets – IT, OT, IoT, IoMT – on your network.
Forescout helps the world’s largest and most trusted organizations manage their cyber risk through automation and data-powered insights.
Blog
2022 Threat Roundup: The Emergence of Mixed IT/IoT Threats
Read More
Press Release
Forescout Addresses Modern SecOps Challenges with Launch of Forescout XDR
Read More
Blog
Introducing Forescout XDR: Putting the X, D and R Back in XDR
Read More
Your digital terrain is changing – rapidly.
More assets. Greater threats. Short-staffed. Security is a non-stop journey. Forescout makes life easier.
billion
Estimated number of connected devices by 2025
%
Percentage of additional assets Forescout customers discover on their network
%
Percentage of data breaches from unpatched systems
%
Percentage of breaches that contain a human element
You can secure your organization – automatically.
The Forescout Platform provides complete asset inventory, continuous compliance, network segmentation and a strong foundation for Zero Trust. Anything less than that is, well, not secure.
See Our Solutions
The Forescout Platform
Cybersecurity automation. On-premise and in the cloud.
What about Network Access Control?
Analysts and customers know Forescout as the world leader in NAC. 94% of customer reviews recommend Forescout. Yes, we can meet your NAC requirements and help you on your security journey.
2021 Gartner Peer Insights™ Customers’ Choice for NAC
Schedule a Demo
Get a personalized tour of our solutions and see how we can help you automate cybersecurity.
Request a Demo
Related news
Debian Linux Security Advisory 5495-1 - Multiple vulnerabilities were discovered in frr, the FRRouting suite of internet protocols, while processing malformed requests and packets the BGP daemon may have reachable assertions, NULL pointer dereference, out-of-bounds memory access, which may lead to denial of service attack.
Cybersecurity researchers have uncovered weaknesses in a software implementation of the Border Gateway Protocol (BGP) that could be weaponized to achieve a denial-of-service (DoS) condition on vulnerable BGP peers. The three vulnerabilities reside in version 8.4 of FRRouting, a popular open source internet routing protocol suite for Linux and Unix platforms. It's currently used by several