4.3
CVSSv2

CVE-2017-7543

Published: 26/07/2018 Updated: 09/10/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

A race-condition flaw exists in openstack-neutron prior to 7.2.0-12.1, 8.x prior to 8.3.0-11.1, 9.x prior to 9.3.1-2.1, and 10.x prior to 10.0.2-1.1, where, following a minor overcloud update, neutron security groups were disabled. Specifically, the following were reset to 0: net.bridge.bridge-nf-call-ip6tables and net.bridge.bridge-nf-call-iptables. The race was only triggered by an update, at which point an attacker could access exposed tenant VMs and network resources.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openstack neutron

redhat openstack 6.0

redhat openstack 7.0

redhat openstack 9.0

redhat openstack 10.0

redhat openstack 11.0

redhat openstack 8.0

Vendor Advisories

A race-condition flaw was discovered in openstack-neutron where, following a minor overcloud update, neutron security groups were disabled Specifically, the following were reset to 0: netbridgebridge-nf-call-ip6tables and netbridgebridge-nf-call-iptables The race was only triggered by an update, at which point an attacker could access exposed ...