Lucene search

K
redosRedosROS-20240423-08
HistoryApr 23, 2024 - 12:00 a.m.

ROS-20240423-08

2024-04-2300:00:00
redos.red-soft.ru
7
open vswitch
icmpv6
vulnerability
bypass
redirection

7.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H

7.5 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

A vulnerability in the Open vSwitch (OvS) software multilayer switch allows ICMPv6 packets to
announce neighbors between virtual machines to bypass OpenFlow rules. Exploitation of the vulnerability could
allow an attacker, to create special packets with a modified or spoofed target IP address field,
which could redirect ICMPv6 traffic to arbitrary IP addresses

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64openvswitch<= 3.1.1-2UNKNOWN

7.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H

7.5 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%