First published: Thu Jul 18 2019(Updated: )
The Linux Foundation ONOS 2.0.0 and earlier is affected by: Poor Input-validation. The impact is: A network administrator (or attacker) can install unintended flow rules in the switch by mistake. The component is: applyFlowRules() and apply() functions in FlowRuleManager.java. The attack vector is: network management and connectivity.
Credit: josh@bress.net
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Foundation Open Network Operating System | <=2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1010252 has a medium severity rating due to the risk of unintended flow rules being applied in switches.
To mitigate CVE-2019-1010252, validate input thoroughly in the applyFlowRules() and apply() functions before installation of flow rules.
CVE-2019-1010252 affects users of the Linux Foundation ONOS version 2.0.0 and earlier.
An attacker can exploit CVE-2019-1010252 by tricking the system into installing unintended flow rules.
CVE-2019-1010252 involves the applyFlowRules() and apply() functions within the FlowRuleManager.java.