Vulnerability Details : CVE-2015-1611
OpenFlow plugin for OpenDaylight before Helium SR3 allows remote attackers to spoof the SDN topology and affect the flow of data, related to "fake LLDP injection."
Vulnerability category: Input validation
Products affected by CVE-2015-1611
- cpe:2.3:a:opendaylight:openflow:-:*:*:*:*:opendaylight:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-1611
0.97%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 75 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-1611
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2015-1611
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-1611
-
https://cloudrouter.org/security/
Third Party Advisory
-
https://git.opendaylight.org/gerrit/#/c/16193/
Issue Tracking;Patch;Third Party Advisory
-
https://git.opendaylight.org/gerrit/#/c/16208/
Issue Tracking;Patch;Third Party Advisory
-
http://www.internetsociety.org/sites/default/files/10_4_2.pdf
Page not found | Internet SocietyTechnical Description
-
https://wiki.opendaylight.org/view/Security_Advisories#.5BModerate.5D_CVE-2015-1611_CVE-2015-1612_openflowplugin:_topology_spoofing_via_LLDP
Security:Advisories - OpenDaylight ProjectPatch;Third Party Advisory
-
http://www.securityfocus.com/bid/73254
OpenDaylight OpenFlow Plugin Multiple Security Bypass VulnerabilitiesThird Party Advisory;VDB Entry
Jump to