First published: Tue Apr 04 2017(Updated: )
OpenFlow plugin for OpenDaylight before Helium SR3 allows remote attackers to spoof the SDN topology and affect the flow of data, related to the reuse of LLDP packets, aka "LLDP Relay."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenDaylight |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1612 is considered to be of medium severity due to its potential impact on SDN topology spoofing.
To mitigate CVE-2015-1612, it is recommended to upgrade to the latest version of OpenDaylight beyond Helium SR3.
All users of OpenDaylight with the OpenFlow plugin prior to Helium SR3 are affected by CVE-2015-1612.
CVE-2015-1612 allows remote attackers to spoof the SDN topology, potentially compromising the flow of data.
Yes, CVE-2015-1612 is related to the reuse of LLDP packets in the OpenFlow plugin.