Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openstack neutron vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv3
CVE-2023-3637
An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were...
Redhat Openstack Platform 13.0
Redhat Openstack Platform 16.2
6.5
CVSSv3
CVE-2022-3277
An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were...
Redhat Openstack Platform 16.1
Redhat Openstack Platform 13.0
Redhat Openstack Platform 16.2
Openstack Neutron
3.3
CVSSv3
CVE-2022-37394
An issue exists in OpenStack Nova prior to 23.2.2, 24.x prior to 24.1.2, and 25.x prior to 25.0.2. By creating a neutron port with the direct vnic_type, creating an instance bound to that port, and then changing the vnic_type of the bound port to macvtap, an authenticated user ma...
Openstack Nova
6.5
CVSSv3
CVE-2021-40797
An issue exists in the routes middleware in OpenStack Neutron prior to 16.4.1, 17.x prior to 17.2.1, and 18.x prior to 18.1.1. By making API requests involving nonexistent controllers, an authenticated user may cause the API worker to consume increasing amounts of memory, resulti...
Openstack Neutron
6.5
CVSSv3
CVE-2021-40085
An issue exists in OpenStack Neutron prior to 16.4.1, 17.x prior to 17.2.1, and 18.x prior to 18.1.1. Authenticated attackers can reconfigure dnsmasq via a crafted extra_dhcp_opts value.
Openstack Neutron
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Debian Debian Linux 11.0
9.1
CVSSv3
CVE-2021-38598
OpenStack Neutron prior to 16.4.1, 17.x prior to 17.1.3, and 18.0.0 allows hardware address impersonation when the linuxbridge driver with ebtables-nft is used on a Netfilter-based platform. By sending carefully crafted packets, anyone in control of a server instance connected to...
Openstack Neutron 18.0.0
Openstack Neutron
7.1
CVSSv3
CVE-2021-20267
A flaw was found in openstack-neutron's default Open vSwitch firewall rules. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the IPv6 addresses of other systems on the network, resulting in denial o...
Openstack Neutron 18.0.0
Openstack Neutron
Redhat Openstack Platform 16.1
Redhat Openstack Platform 13.0
Redhat Openstack Platform 10.0
Redhat Openstack Platform 16.2
6.5
CVSSv3
CVE-2019-10876
An issue exists in OpenStack Neutron 11.x prior to 11.0.7, 12.x prior to 12.0.6, and 13.x prior to 13.0.3. By creating two security groups with separate/overlapping port ranges, an authenticated user may prevent Neutron from being able to configure networks on any compute nodes w...
Openstack Neutron
Redhat Openstack 13
Redhat Openstack 14
6.5
CVSSv3
CVE-2019-9735
An issue exists in the iptables firewall module in OpenStack Neutron prior to 10.0.8, 11.x prior to 11.0.7, 12.x prior to 12.0.6, and 13.x prior to 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for exam...
Openstack Neutron
Redhat Openstack 10
Redhat Openstack 14
Redhat Openstack 13
Debian Debian Linux 9.0
5.3
CVSSv3
CVE-2018-14636
Live-migrated instances are briefly able to inspect traffic for other instances on the same hypervisor. This brief window could be extended indefinitely if the instance's port is set administratively down prior to live-migration and kept down after the migration is complete....
Openstack Neutron
Openstack Neutron 13.0.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »