Lucene search

K
githubGitHub Advisory DatabaseGHSA-46HR-3CQ3-MCGP
HistorySep 16, 2024 - 2:37 p.m.

OpenDaylight Authentication, Authorization and Accounting (AAA) peer impersonation vulnerability

2024-09-1614:37:28
CWE-285
CWE-287
CWE-520
GitHub Advisory Database
github.com
2
opendaylight
authentication
authorization
accounting
vulnerability
rogue controller
cluster configuration

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

6.7

Confidence

High

An issue was discovered in OpenDaylight Authentication, Authorization and Accounting (AAA) through 0.19.3. A rogue controller can join a cluster to impersonate an offline peer, even if this rogue controller does not possess the complete cluster configuration information.

Affected configurations

Vulners
Node
org.opendaylight.aaa\aaaMatchartifacts
VendorProductVersionCPE
org.opendaylight.aaa\aaaartifactscpe:2.3:a:org.opendaylight.aaa\:aaa:artifacts:*:*:*:*:*:*:*:*

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

6.7

Confidence

High

Related for GHSA-46HR-3CQ3-MCGP