First published: Thu May 24 2018(Updated: )
OpenFlow version 1.0 onwards contains a Denial of Service and Improper authorization vulnerability in OpenFlow handshake: The DPID (DataPath IDentifier) in the features_reply message are inherently trusted by the controller. that can result in Denial of Service, Unauthorized Access, Network Instability. This attack appear to be exploitable via Network connectivity: the attacker must first establish a transport connection with the OpenFlow controller and then initiate the OpenFlow handshake.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Open Networking OpenFlow |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000155 has a high severity rating due to its potential to cause Denial of Service and unauthorized access.
Fixing CVE-2018-1000155 involves updating to a patched version of OpenFlow that addresses the vulnerability.
CVE-2018-1000155 is classified as a Denial of Service and improper authorization vulnerability.
CVE-2018-1000155 affects OpenFlow version 1.0 and onwards.
The main risk of CVE-2018-1000155 is the potential for network instability and unauthorized access due to insufficient validation of the DPID in OpenFlow handshake.