First published: Thu Apr 20 2023(Updated: )
An issue was discovered in ONOS 2.5.1. To attack an intent installed by a normal user, a remote attacker can install a duplicate intent with a different key, and then remove the duplicate one. This will remove the flow rules of the intent, even though the intent still exists in the controller.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ONF SD-RAN ONOS | =2.5.1 | |
=2.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24109 is classified as a medium severity vulnerability due to the potential disruption of network flow rules.
To mitigate CVE-2022-24109, it's recommended to upgrade to a later version of ONOS that addresses this issue.
CVE-2022-24109 allows remote attackers to disrupt the flow rules of an intent by exploiting a duplicate intent installation.
CVE-2022-24109 affects users running ONOS version 2.5.1.
CVE-2022-24109 can lead to unexpected network behavior by removing flow rules associated with an intent without its deletion.