{"vulnerability": "cve-2023-5366", "sightings": [{"uuid": "15f37e75-71ef-444e-9d2c-69a354d11df4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2023-53661", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "8b18cb9e-0b11-4219-a70d-4064d140c71f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2023-53662", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "8724da52-fe8d-41ac-ae45-5fb266d79cf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5366", "type": "seen", "source": "https://t.me/MrVGunz/1205", "content": "\ud83d\udccd\u0627\u0637\u0644\u0627\u0639\u06cc\u0647 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0636\u0639\u0641 \u062f\u0631 Open vSwitch: \u0631\u0627\u0647\u06a9\u0627\u0631 \u0627\u0631\u062a\u0642\u0627\u0621 \u0627\u0645\u0646\u06cc\u062a\n\n\u062f\u0631 19 \u0641\u0648\u0631\u06cc\u0647 2024\u060c \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u062c\u062f\u06cc\u062f\u06cc \u0628\u0631\u0627\u06cc \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631 Open vSwitch \u0645\u0646\u062a\u0634\u0631 \u0634\u062f \u06a9\u0647 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc CVE-2023-5366 \u0631\u0627 \u0628\u0631\u0637\u0631\u0641 \u0645\u06cc\u200c\u06a9\u0646\u062f. \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0627\u062c\u0627\u0632\u0647 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u0642\u0648\u0627\u0646\u06cc\u0646 OpenFlow \u0631\u0627 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0628\u0633\u062a\u0647\u200c\u0647\u0627\u06cc ICMPv6 Neighbor Advertisement \u0645\u063a\u0634\u0648\u0634 \u062f\u0647\u062f. \u0627\u06cc\u0646 \u0645\u0634\u06a9\u0644 \u062f\u0631 \u0646\u0633\u062e\u0647 Debian 10 (Buster) \u0628\u0627 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0628\u0647 \u0646\u0633\u062e\u0647 2.10.7+ds1-0+deb10u5 \u0631\u0641\u0639 \u0634\u062f\u0647 \u0627\u0633\u062a. \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0628\u0627\u06cc\u062f \u0628\u0647\u200c\u0633\u0631\u0639\u062a \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631 \u062e\u0648\u062f \u0631\u0627 \u0628\u0647 \u0627\u06cc\u0646 \u0646\u0633\u062e\u0647 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u06a9\u0646\u0646\u062f.\n\n\ud83d\udd17 \u062c\u0647\u062a \u0645\u0637\u0627\u0644\u0639\u0647 \u0627\u062f\u0627\u0645\u0647 \u0645\u0642\u0627\u0644\u0647: \u0644\u06cc\u0646\u06a9\n\n\ud83d\udccd Security Advisory on Open vSwitch Vulnerability: Security Upgrade Solution\n\nOn February 19, 2024, a new update for the Open vSwitch software was released to address the vulnerability CVE-2023-5366. This vulnerability allows access to OpenFlow rules through spoofed ICMPv6 Neighbor Advertisement packets. It has been resolved in Debian 10 (Buster) with the update to version 2.10.7+ds1-0+deb10u5. Users are strongly advised to promptly update their software to this version.\n\n\ud83d\udd17 For more information, please visit: Link", "creation_timestamp": "2024-07-16T10:21:10.000000Z"}, {"uuid": "70906f61-e85a-4205-bda7-dd7b9ef5299e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5366", "type": "seen", "source": "https://t.me/cibsecurity/71753", "content": "\u203c CVE-2023-5366 \u203c\n\nA flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-06T22:13:40.000000Z"}, {"uuid": "55773be5-2fa3-46b2-af5c-a04d2d4f15f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2023-53662", "type": "seen", "source": "https://www.hkcert.org/security-bulletin/ubuntu-linux-kernel-multiple-vulnerabilities_20260408", "content": "", "creation_timestamp": "2026-04-07T18:00:00.000000Z"}]}