Skip to content

Openstack Neutron has Insufficient Verification of IPv6 addresses

High severity GitHub Reviewed Published May 24, 2022 to the GitHub Advisory Database • Updated Feb 23, 2024

Package

pip neutron (pip)

Affected versions

>= 16.0.0, < 16.3.1
< 15.3.3
>= 17.0.0, < 17.1.1

Patched versions

16.3.1
15.3.3
17.1.1

Description

A flaw was found in openstack-neutron's default Open vSwitch firewall rules. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the IPv6 addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations. Only deployments using the Open vSwitch driver are affected. Source: OpenStack project. Versions before openstack-neutron 15.3.3, openstack-neutron 16.3.1 and openstack-neutron 17.1.1 are affected.

References

Published by the National Vulnerability Database May 28, 2021
Published to the GitHub Advisory Database May 24, 2022
Reviewed Feb 23, 2024
Last updated Feb 23, 2024

Severity

High
7.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
High
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H

Weaknesses

CVE ID

CVE-2021-20267

GHSA ID

GHSA-w8hx-f868-pvch

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.