CVE-2021-20267

CWE-3459 documents7 sources
Severity
7.1HIGH
EPSS
0.1%
top 68.48%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 28
Latest updateMay 10

Description

A flaw was found in openstack-neutron's default Open vSwitch firewall rules. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the IPv6 addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations. Only deployments using the Open vSwitch driver are affected. Source: OpenStack project. Versions before openstack-neutron 15.3.3, op

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:HExploitability: 2.8 | Impact: 4.2

Affected Packages6 packages

NVDopenstack/neutron17.0.017.1.3+2
CVEListV5openstack-neutronopenstack-neutron 15.3.3, openstack-neutron 16.3.1, openstack-neutron 17.1.1
NVDredhat/openstack_platform4 versions+3
PyPIneutron16.0.016.3.1+2
Debianneutron< 2:17.1.1-5+3

Patches

🔴Vulnerability Details

5
OSV
neutron vulnerabilities2023-05-10
GHSA
Openstack Neutron has Insufficient Verification of IPv6 addresses2022-05-24
OSV
Openstack Neutron has Insufficient Verification of IPv6 addresses2022-05-24
CVEList
CVE-2021-20267: A flaw was found in openstack-neutron's default Open vSwitch firewall rules2021-05-28
OSV
CVE-2021-20267: A flaw was found in openstack-neutron's default Open vSwitch firewall rules2021-05-28

📋Vendor Advisories

3
Ubuntu
OpenStack Neutron vulnerabilities2023-05-10
Debian
CVE-2021-20267: neutron - A flaw was found in openstack-neutron's default Open vSwitch firewall rules. By ...2021
Red Hat
openstack-neutron: Anti-spoofing bypass using Open vSwitch2020-11-05
CVE-2021-20267 (HIGH CVSS 7.1) | A flaw was found in openstack-neutr | cvebase.io