First published: Mon Aug 23 2021(Updated: )
OpenStack Neutron before 16.4.1, 17.x before 17.1.3, and 18.0.0 allows hardware address impersonation when the linuxbridge driver with ebtables-nft is used on a Netfilter-based platform. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the hardware addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Neutron | <16.4.1 | |
OpenStack Neutron | >=17.0.0<17.1.3 | |
OpenStack Neutron | =18.0.0 | |
pip/neutron | =18.0.0 | |
pip/neutron | >=17.0.0<17.1.3 | 17.1.3 |
pip/neutron | <16.4.1 | 16.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38598 is a vulnerability in OpenStack Neutron that allows hardware address impersonation.
OpenStack Neutron versions before 16.4.1, 17.x before 17.1.3, and 18.0.0 are affected by CVE-2021-38598.
CVE-2021-38598 has a severity rating of 9.1 (critical).
CVE-2021-38598 allows hardware address impersonation when the linuxbridge driver with ebtables-nft is used on a Netfilter-based platform.
Yes, upgrading to OpenStack Neutron version 16.4.1, 17.1.3, or 18.0.0 will fix CVE-2021-38598.