First published: Mon Mar 20 2017(Updated: )
hosttracker in OpenDaylight l2switch allows remote attackers to change the host location information by spoofing the MAC address, aka "topology spoofing."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenDaylight |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1610 has a severity rating of moderate.
To fix CVE-2015-1610, you should update to the latest version of the OpenDaylight l2switch component.
CVE-2015-1610 allows remote attackers to perform topology spoofing by altering host location information.
The vulnerability affects the OpenDaylight l2switch software.
CVE-2015-1610 may lead to improper network mapping and potentially unauthorized access to sensitive data.