Vulnerability Description
OpenFlow version 1.0 onwards contains a Denial of Service and Improper authorization vulnerability in OpenFlow handshake: The DPID (DataPath IDentifier) in the features_reply message are inherently trusted by the controller. that can result in Denial of Service, Unauthorized Access, Network Instability. This attack appear to be exploitable via Network connectivity: the attacker must first establish a transport connection with the OpenFlow controller and then initiate the OpenFlow handshake.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opennetworking | Openflow | - |
Related Weaknesses (CWE)
References
- http://users.sec.t-labs.tu-berlin.de/~hashkash/openflow/BrianOnosSecurityRequestMailing ListThird Party Advisory
- http://users.sec.t-labs.tu-berlin.de/~hashkash/openflow/BrianOnosSecurityRequestMailing ListThird Party Advisory
FAQ
What is CVE-2018-1000155?
CVE-2018-1000155 is a vulnerability with a CVSS score of 9.8 (CRITICAL). OpenFlow version 1.0 onwards contains a Denial of Service and Improper authorization vulnerability in OpenFlow handshake: The DPID (DataPath IDentifier) in the features_reply message are inherently tr...
How severe is CVE-2018-1000155?
CVE-2018-1000155 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-1000155?
Check the references section above for vendor advisories and patch information. Affected products include: Opennetworking Openflow.