Description
A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.
Published: 2023-10-06
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3734-1 openvswitch security update
Debian DSA Debian DSA DSA-5640-1 openvswitch security update
EUVD EUVD EUVD-2023-57682 A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.
Ubuntu USN Ubuntu USN USN-6514-1 Open vSwitch vulnerability
Ubuntu USN Ubuntu USN USN-6690-1 Open vSwitch vulnerabilities
History

No history.

Subscriptions

Openvswitch Openvswitch
Redhat Enterprise Linux Fast Datapath Openshift Openshift Container Platform Openstack Virtualization
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-02-13T17:20:09.786Z

Reserved: 2023-10-03T19:14:58.793Z

Link: CVE-2023-5366

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-10-06T18:15:12.520

Modified: 2024-11-21T08:41:37.093

Link: CVE-2023-5366

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-09-26T00:00:00Z

Links: CVE-2023-5366 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses