CVE Vulnerabilities

CVE-2023-5366

Insufficient Verification of Data Authenticity

Published: Oct 06, 2023 | Modified: Nov 21, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
5.5 MODERATE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.

Weakness

The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.

Affected Software

NameVendorStart VersionEnd Version
OpenvswitchOpenvswitch*2023-02-28 (excluding)
Fast Datapath for Red Hat Enterprise Linux 8RedHatopenvswitch2.17-0:2.17.0-148.el8fdp*
Fast Datapath for Red Hat Enterprise Linux 8RedHatopenvswitch3.1-0:3.1.0-96.el8fdp*
Fast Datapath for Red Hat Enterprise Linux 9RedHatopenvswitch2.17-0:2.17.0-131.el9fdp*
Fast Datapath for Red Hat Enterprise Linux 9RedHatopenvswitch3.2-0:3.2.0-56.el9fdp*
Fast Datapath for Red Hat Enterprise Linux 9RedHatopenvswitch3.1-0:3.1.0-88.el9fdp*
OpenvswitchUbuntubionic*
OpenvswitchUbuntudevel*
OpenvswitchUbuntuesm-infra/bionic*
OpenvswitchUbuntuesm-infra/focal*
OpenvswitchUbuntuesm-infra/xenial*
OpenvswitchUbuntufocal*
OpenvswitchUbuntujammy*
OpenvswitchUbuntulunar*
OpenvswitchUbuntumantic*
OpenvswitchUbuntunoble*
OpenvswitchUbuntuoracular*
OpenvswitchUbuntuplucky*
OpenvswitchUbuntuquesting*
OpenvswitchUbuntutrusty*
OpenvswitchUbuntuupstream*
OpenvswitchUbuntuxenial*

References