Vulnerability Name: | CVE-2021-20267 (CCN-202766) | ||||||||||||
Assigned: | 2020-12-17 | ||||||||||||
Published: | 2021-05-28 | ||||||||||||
Updated: | 2022-10-07 | ||||||||||||
Summary: | A flaw was found in openstack-neutron's default Open vSwitch firewall rules. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the IPv6 addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations. Only deployments using the Open vSwitch driver are affected. Source: OpenStack project. Versions before openstack-neutron 15.3.3, openstack-neutron 16.3.1 and openstack-neutron 17.1.1 are affected. | ||||||||||||
CVSS v3 Severity: | 7.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) 6.2 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C)
6.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:P)
| ||||||||||||
Vulnerability Type: | CWE-345 | ||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-20267 Source: CCN Type: Red Hat Bugzilla Bug 1934330 (CVE-2021-20267) - CVE-2021-20267 openstack-neutron: Anti-spoofing bypass using Open vSwitch Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1934330 Source: XF Type: UNKNOWN openstack-cve202120267-dos(202766) Source: CONFIRM Type: Patch, Vendor Advisory https://security.openstack.org/ossa/OSSA-2021-001.html Source: CCN Type: OpenStack Web site Neutron Source: CCN Type: WhiteSource Vulnerability Database CVE-2021-20267 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |