Vulnerability Details : CVE-2018-14636
Live-migrated instances are briefly able to inspect traffic for other instances on the same hypervisor. This brief window could be extended indefinitely if the instance's port is set administratively down prior to live-migration and kept down after the migration is complete. This is possible due to the Open vSwitch integration bridge being connected to the instance during migration. When connected to the integration bridge, all traffic for instances using the same Open vSwitch instance would potentially be visible to the migrated guest, as the required Open vSwitch VLAN filters are only applied post-migration. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3, 11.0.5 are vulnerable.
Products affected by CVE-2018-14636
- cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*
- cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*
- cpe:2.3:a:openstack:neutron:13.0.0:b1:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-14636
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 38 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-14636
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.5
|
LOW | AV:N/AC:M/Au:S/C:P/I:N/A:N |
6.8
|
2.9
|
NIST | |
5.3
|
MEDIUM | CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.6
|
3.6
|
NIST | |
5.3
|
MEDIUM | CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.6
|
3.6
|
Red Hat, Inc. |
CWE ids for CVE-2018-14636
-
The product does not adequately verify the identity of actors at both ends of a communication channel, or does not adequately ensure the integrity of the channel, in a way that allows the channel to be accessed or influenced by an actor that is not an endpoint.Assigned by: secalert@redhat.com (Secondary)
References for CVE-2018-14636
-
https://bugs.launchpad.net/neutron/+bug/1734320
Bug #1734320 “Eavesdropping private traffic” : Bugs : neutronIssue Tracking;Third Party Advisory
-
https://bugs.launchpad.net/neutron/+bug/1767422
Bug #1767422 “Neutron agent internal ports remain untagged for s...” : Bugs : neutronIssue Tracking;Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14636
1594977 – (CVE-2018-14636) CVE-2018-14636 openstack-neutron: eavesdropping private traffic due to trunk ports after live migrationIssue Tracking;Third Party Advisory
Jump to