It was found that all flows, including active and inactive, in the config datastore are installed back in the switch upon reconnection, as part of the node reconciliation process in OpenDayLight. This may lead to denial of service via table overflow or possibly circumventing of the controller's control.
Find out more about CVE-2018-1078 from the MITRE CVE dictionary dictionary and NIST NVD.
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
CVSS3 Base Score | 4.8 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H |
Attack Vector | Adjacent Network |
Attack Complexity | High |
Privileges Required | Low |
User Interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity Impact | None |
Availability Impact | High |
Platform | Package | State |
---|---|---|
Red Hat OpenStack Platform 9.0 | opendaylight | Affected |
Red Hat OpenStack Platform 8.0 (Liberty) | opendaylight | Affected |
Red Hat OpenStack Platform 13.0 (Queens) | opendaylight | Affected |
Red Hat OpenStack Platform 12.0 | opendaylight | Affected |
Red Hat OpenStack Platform 11.0 (Ocata) | opendaylight | Affected |
Red Hat OpenStack Platform 10 | opendaylight | Affected |