First published: Wed Jan 22 2025(Updated: )
A flaw was found in the Open Virtual Network (OVN). Specially crafted UDP packets may bypass egress access control lists (ACLs) in OVN installations configured with a logical switch with DNS records set on it and if the same switch has any egress ACLs configured. This issue can lead to unauthorized access to virtual machines and containers running on the OVN network.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Open Virtual Network | >=22.03.8<=24.09.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0650 has been classified as a potentially high severity vulnerability due to its ability to bypass egress access control lists.
To mitigate CVE-2025-0650, ensure that your OVN installation is upgraded to a version newer than 24.09.2 or patched accordingly.
CVE-2025-0650 affects Open Virtual Network installations with logical switches that have DNS records and configured egress ACLs.
The potential risks of CVE-2025-0650 include unauthorized access to restricted network segments and potential data exfiltration.
Yes, CVE-2025-0650 has public documentation detailing its effects and mitigation strategies available through security advisories.