CVE-2018-1000155
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2018-1000155 from the MITRE CVE dictionary dictionary and NIST NVD.
CVSS v3 metrics
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
| CVSS3 Base Score | 5.9 |
|---|---|
| CVSS3 Base Metrics | CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H |
| Attack Vector | Adjacent Network |
| Attack Complexity | High |
| Privileges Required | Low |
| User Interaction | None |
| Scope | Unchanged |
| Confidentiality | Low |
| Integrity Impact | Low |
| Availability Impact | High |
Affected Packages State
| Platform | Package | State |
|---|---|---|
| Red Hat OpenStack Platform 9.0 | opendaylight | Will not fix |
| Red Hat OpenStack Platform 8.0 (Liberty) | opendaylight | Will not fix |
| Red Hat OpenStack Platform 13.0 (Queens) | opendaylight | Affected |
| Red Hat OpenStack Platform 12.0 | opendaylight | Will not fix |
| Red Hat OpenStack Platform 11.0 (Ocata) | opendaylight | Will not fix |
| Red Hat OpenStack Platform 10 | opendaylight | Will not fix |
Mitigation
Enable TLS in OpenFlow plugin. Upstream documentation is a useful resource.
https://wiki.opendaylight.org/view/OpenDaylight_OpenFlow_Plugin:_TLS_Support
External References
CVE description copyright © 2017, The MITRE Corporation
