7.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
5.6 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
5.1%
A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement
packets between virtual machines to bypass OpenFlow rules. This issue may
allow a local attacker to create specially crafted packets with a modified
or spoofed target IP address field that can redirect ICMPv6 traffic to
arbitrary IP addresses.
Author | Note |
---|---|
mdeslaur | This was originally marked as fixed in USN-6514-1, but the fix was incomplete. See the ovs-announce list post for the new commits to fix this issue. The bp commits below are required in addition to the other commits. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | openvswitch | < any | UNKNOWN |
ubuntu | 20.04 | noarch | openvswitch | < 2.13.8-0ubuntu1.4 | UNKNOWN |
ubuntu | 22.04 | noarch | openvswitch | < 2.17.9-0ubuntu0.22.04.1 | UNKNOWN |
ubuntu | 23.10 | noarch | openvswitch | < 3.2.2-0ubuntu0.23.10.1 | UNKNOWN |
ubuntu | 24.04 | noarch | openvswitch | < 3.3.0~git20240118.e802fe7-3ubuntu1 | UNKNOWN |
launchpad.net/bugs/cve/CVE-2023-5366
mail.openvswitch.org/pipermail/ovs-announce/2024-February/000342.html
nvd.nist.gov/vuln/detail/CVE-2023-5366
security-tracker.debian.org/tracker/CVE-2023-5366
ubuntu.com/security/notices/USN-6514-1
ubuntu.com/security/notices/USN-6690-1
www.cve.org/CVERecord?id=CVE-2023-5366
7.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
5.6 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
5.1%