ID CVE-2018-1078
Summary OpenDayLight version Carbon SR3 and earlier contain a vulnerability during node reconciliation that can result in traffic flows that should be expired or should expire shortly being re-installed and their timers reset resulting in traffic being allowed that should be expired.
References
Vulnerable Configurations
  • cpe:2.3:a:opendaylight:openflow:*:*:*:*:*:opendaylight:*:*
    cpe:2.3:a:opendaylight:openflow:*:*:*:*:*:opendaylight:*:*
  • cpe:2.3:a:opendaylight:openflow:sp1:*:*:*:*:opendaylight:*:*
    cpe:2.3:a:opendaylight:openflow:sp1:*:*:*:*:opendaylight:*:*
  • cpe:2.3:a:opendaylight:openflow:sp2:*:*:*:*:opendaylight:*:*
    cpe:2.3:a:opendaylight:openflow:sp2:*:*:*:*:opendaylight:*:*
  • cpe:2.3:a:opendaylight:openflow:sp3:*:*:*:*:opendaylight:*:*
    cpe:2.3:a:opendaylight:openflow:sp3:*:*:*:*:opendaylight:*:*
CVSS
Base: 7.5 (as of 09-10-2019 - 23:38)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
confirm https://jira.opendaylight.org/browse/OPNFLWPLUG-971
misc https://bugzilla.redhat.com/show_bug.cgi?id=1533501
Last major update 09-10-2019 - 23:38
Published 16-03-2018 - 20:29
Last modified 09-10-2019 - 23:38
Back to Top