This vulnerability exists due to errors in handling malformed Border Gateway Protocol (BGP) network messages. When processing a malformed BGP update, an affected device may close and re-establish the BGP interface that received the malicious update.
An unauthenticated, remote attacker could exploit this vulnerability by sending a malicious BGP message to an affected device, causing the device's BGP interface to close and reset. This action could erase the router's BGP routing table for other Autonomous Systems (AS). Routing information for IP addresses that fall out of the bounds of the local AS, likely a corporate entity, will be lost and will need to be rebuilt. The AS itself may maintain routing tables for more local IP addresses using another routing protocol, such as Interior Gateway Protocol (IGP), Open Shortest Path First protocol (OSPF), or possibly Routing Information Protocol (RIP).