9.8
CVSSv3

CVE-2018-1078

Published: 16/03/2018 Updated: 09/10/2019
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

OpenDayLight version Carbon SR3 and previous versions contain a vulnerability during node reconciliation that can result in traffic flows that should be expired or should expire shortly being re-installed and their timers reset resulting in traffic being allowed that should be expired.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

opendaylight openflow sp3

opendaylight openflow sp1

opendaylight openflow

opendaylight openflow sp2

Vendor Advisories

It was found that all flows, including active and inactive, in the config datastore are installed back in the switch upon reconnection, as part of the node reconciliation process in OpenDayLight This may lead to denial of service via table overflow or possibly circumventing of the controller's control ...