First published: Thu Jul 18 2019(Updated: )
The Linux Foundation ONOS 2.0.0 and earlier is affected by: Poor Input-validation. The impact is: A network administrator (or attacker) can install unintended flow rules in the switch by mistake. The component is: createFlow() and createFlows() functions in FlowWebResource.java (RESTful service). The attack vector is: network management and connectivity.
Credit: josh@bress.net
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Foundation Open Network Operating System | <=2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1010250 has a moderate severity level due to the potential for unintended flow rule installation in network switches.
To fix CVE-2019-1010250, update to a version of ONOS later than 2.0.0 that addresses the poor input validation issue.
CVE-2019-1010250 affects users of the Linux Foundation ONOS version 2.0.0 and earlier.
The createFlow() and createFlows() functions in FlowWebResource.java are involved in the vulnerability of CVE-2019-1010250.
CVE-2019-1010250 can be exploited by network administrators or attackers who inadvertently install unintended flow rules in the switch.