Vulnerability Details : CVE-2018-14635
When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable.
Vulnerability category: Input validationDenial of service
Products affected by CVE-2018-14635
- cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*
- cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*
- cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*
- cpe:2.3:a:openstack:neutron:13.0.0.0:b1:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-14635
0.43%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 61 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-14635
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:P |
8.0
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST | |
6.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
Red Hat, Inc. |
CWE ids for CVE-2018-14635
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
References for CVE-2018-14635
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14635
1607822 – (CVE-2018-14635) CVE-2018-14635 openstack-neutron: A router interface out of subnet IP range results in a denial of serviceIssue Tracking;Patch;Third Party Advisory
-
https://git.openstack.org/cgit/openstack/neutron/commit/?id=54aa6e81cb17b33ce4d5d469cc11dec2869c762d
Disallow router interface out of subnet IP range · 54aa6e81cb - neutron - OpenDev: Free Software Needs Free ToolsPatch;Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2018:2715
RHSA-2018:2715 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2710
RHSA-2018:2710 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://bugs.launchpad.net/neutron/+bug/1757482
Bug #1757482 “IP address for a router interface allowed outside ...” : Bugs : neutronThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:3792
RHSA-2018:3792 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2721
RHSA-2018:2721 - Security Advisory - Red Hat Customer PortalThird Party Advisory
Jump to