CVE-2023-5366

A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.1 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
redhatCNA
7.1 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 3%
VendorProductVersion
openvswitchopenvswitch
𝑥
< 2023-02-28
redhatopenshift_container_platform
4.0
redhatvirtualization
4.0
redhatenterprise_linux
7.0
redhatfast_datapath
-
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openvswitch
bullseye (security)
2.15.0+ds1-2+deb11u5
fixed
bullseye
2.15.0+ds1-2+deb11u5
fixed
bookworm
3.1.0-2+deb12u1
fixed
bookworm (security)
3.1.0-2+deb12u1
fixed
trixie
3.5.0~git20241129.2af7cef-2
fixed
sid
3.5.0~git20241129.2af7cef-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openvswitch
oracular
Fixed 3.3.0~git20240118.e802fe7-3ubuntu1
released
noble
Fixed 3.3.0~git20240118.e802fe7-3ubuntu1
released
mantic
Fixed 3.2.2-0ubuntu0.23.10.1
released
lunar
ignored
jammy
Fixed 2.17.9-0ubuntu0.22.04.1
released
focal
Fixed 2.13.8-0ubuntu1.4
released
bionic
needed
xenial
ignored
trusty
ignored