This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Openstack First view 2014-04-28
Product Neutron Last view 2023-03-06
Version Type Application
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:openstack:neutron:7.0.0:*:*:*:*:*:*:* 19
cpe:2.3:a:openstack:neutron:7.0.1:*:*:*:*:*:*:* 19
cpe:2.3:a:openstack:neutron:8.1.0:*:*:*:*:*:*:* 19
cpe:2.3:a:openstack:neutron:juno1:*:*:*:*:*:*:* 19
cpe:2.3:a:openstack:neutron:7.0.4:*:*:*:*:*:*:* 19
cpe:2.3:a:openstack:neutron:juno-1:*:*:*:*:*:*:* 19
cpe:2.3:a:openstack:neutron:8.0.0:*:*:*:*:*:*:* 19
cpe:2.3:a:openstack:neutron:7.0.3:*:*:*:*:*:*:* 19
cpe:2.3:a:openstack:neutron:7.0.2:*:*:*:*:*:*:* 19
cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:* 18
cpe:2.3:a:openstack:neutron:13.0.0.0:b1:*:*:*:*:*:* 14
cpe:2.3:a:openstack:neutron:13.0.0:b1:*:*:*:*:*:* 14
cpe:2.3:a:openstack:neutron:18.0.0:*:*:*:*:*:*:* 11
cpe:2.3:a:openstack:neutron:2013.2.2:*:*:*:*:*:*:* 8
cpe:2.3:a:openstack:neutron:2013.1:*:*:*:*:*:*:* 8
cpe:2.3:a:openstack:neutron:2014.1:*:*:*:*:*:*:* 8
cpe:2.3:a:openstack:neutron:2013.1.5:*:*:*:*:*:*:* 8
cpe:2.3:a:openstack:neutron:2013.1.4:*:*:*:*:*:*:* 8
cpe:2.3:a:openstack:neutron:2013.1.3:*:*:*:*:*:*:* 8
cpe:2.3:a:openstack:neutron:2013.1.2:*:*:*:*:*:*:* 8
cpe:2.3:a:openstack:neutron:2013.1.1:*:*:*:*:*:*:* 8
cpe:2.3:a:openstack:neutron:2013.2.1:*:*:*:*:*:*:* 8
cpe:2.3:a:openstack:neutron:2013.2:*:*:*:*:*:*:* 8
cpe:2.3:a:openstack:neutron:2014.1.1:*:*:*:*:*:*:* 7
cpe:2.3:a:openstack:neutron:2012.2.3:*:*:*:*:*:*:* 7
cpe:2.3:a:openstack:neutron:2013.2.3:*:*:*:*:*:*:* 7
cpe:2.3:a:openstack:neutron:2012.2:*:*:*:*:*:*:* 7
cpe:2.3:a:openstack:neutron:2012.2.2:*:*:*:*:*:*:* 7
cpe:2.3:a:openstack:neutron:2012.2.1:*:*:*:*:*:*:* 7
cpe:2.3:a:openstack:neutron:2012.2.4:*:*:*:*:*:*:* 7
cpe:2.3:a:openstack:neutron:2013.2.4:*:*:*:*:*:*:* 5
cpe:2.3:a:openstack:neutron:2014.2:*:*:*:*:*:*:* 4
cpe:2.3:a:openstack:neutron:2014.2.3:*:*:*:*:*:*:* 3
cpe:2.3:a:openstack:neutron:2014.2.1:*:*:*:*:*:*:* 3
cpe:2.3:a:openstack:neutron:2015.1.0:*:*:*:*:*:*:* 2
cpe:2.3:a:openstack:neutron:2015.1.1:*:*:*:*:*:*:* 1

Related : CVE

  Date Alert Description
6.5 2023-03-06 CVE-2022-3277

An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were to submit a significant number of requests, this could lead to a denial of service.

6.5 2021-09-08 CVE-2021-40797

An issue was discovered in the routes middleware in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. By making API requests involving nonexistent controllers, an authenticated user may cause the API worker to consume increasing amounts of memory, resulting in API performance degradation or denial of service.

6.5 2021-08-31 CVE-2021-40085

An issue was discovered in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. Authenticated attackers can reconfigure dnsmasq via a crafted extra_dhcp_opts value.

9.1 2021-08-23 CVE-2021-38598

OpenStack Neutron before 16.4.1, 17.x before 17.1.3, and 18.0.0 allows hardware address impersonation when the linuxbridge driver with ebtables-nft is used on a Netfilter-based platform. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the hardware addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations.

7.1 2021-05-28 CVE-2021-20267

A flaw was found in openstack-neutron's default Open vSwitch firewall rules. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the IPv6 addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations. Only deployments using the Open vSwitch driver are affected. Source: OpenStack project. Versions before openstack-neutron 15.3.3, openstack-neutron 16.3.1 and openstack-neutron 17.1.1 are affected.

6.5 2019-04-05 CVE-2019-10876

An issue was discovered in OpenStack Neutron 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By creating two security groups with separate/overlapping port ranges, an authenticated user may prevent Neutron from being able to configure networks on any compute nodes where those security groups are present, because of an Open vSwitch (OVS) firewall KeyError. All Neutron deployments utilizing neutron-openvswitch-agent are affected.

6.5 2019-03-12 CVE-2019-9735

An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which it's applied. (Only deployments using the iptables security group driver are affected.)

5.3 2018-09-10 CVE-2018-14636

Live-migrated instances are briefly able to inspect traffic for other instances on the same hypervisor. This brief window could be extended indefinitely if the instance's port is set administratively down prior to live-migration and kept down after the migration is complete. This is possible due to the Open vSwitch integration bridge being connected to the instance during migration. When connected to the integration bridge, all traffic for instances using the same Open vSwitch instance would potentially be visible to the migrated guest, as the required Open vSwitch VLAN filters are only applied post-migration. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3, 11.0.5 are vulnerable.

6.5 2018-09-10 CVE-2018-14635

When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable.

5.9 2018-07-26 CVE-2017-7543

A race-condition flaw was discovered in openstack-neutron before 7.2.0-12.1, 8.x before 8.3.0-11.1, 9.x before 9.3.1-2.1, and 10.x before 10.0.2-1.1, where, following a minor overcloud update, neutron security groups were disabled. Specifically, the following were reset to 0: net.bridge.bridge-nf-call-ip6tables and net.bridge.bridge-nf-call-iptables. The race was only triggered by an update, at which point an attacker could access exposed tenant VMs and network resources.

8.2 2016-06-17 CVE-2016-5363

The IPTables firewall in OpenStack Neutron before 7.0.4 and 8.0.0 through 8.1.0 allows remote attackers to bypass an intended MAC-spoofing protection mechanism and consequently cause a denial of service or intercept network traffic via (1) a crafted DHCP discovery message or (2) crafted non-IP traffic.

8.2 2016-06-17 CVE-2016-5362

The IPTables firewall in OpenStack Neutron before 7.0.4 and 8.0.0 through 8.1.0 allows remote attackers to bypass an intended DHCP-spoofing protection mechanism and consequently cause a denial of service or intercept network traffic via a crafted DHCP discovery message.

9.1 2016-06-17 CVE-2015-8914

The IPTables firewall in OpenStack Neutron before 7.0.4 and 8.0.0 through 8.1.0 allows remote attackers to bypass an intended ICMPv6-spoofing protection mechanism and consequently cause a denial of service or intercept network traffic via a link-local source address.

3.5 2015-10-27 CVE-2015-5240

Race condition in OpenStack Neutron before 2014.2.4 and 2015.1 before 2015.1.2, when using the ML2 plugin or the security groups AMQP API, allows remote authenticated users to bypass IP anti-spoofing controls by changing the device owner of a port to start with network: before the security group rules are applied.

4 2015-08-26 CVE-2015-3221

OpenStack Neutron before 2014.2.4 (juno) and 2015.1.x before 2015.1.1 (kilo), when using the IPTables firewall driver, allows remote authenticated users to cause a denial of service (L2 agent crash) by adding an address pair that is rejected by the ipset tool.

4 2015-01-15 CVE-2014-8153

The L3 agent in OpenStack Neutron 2014.2.x before 2014.2.2, when using radvd 2.0+, allows remote authenticated users to cause a denial of service (blocked router update processing) by creating eight routers and assigning an ipv6 non-provider subnet to each.

4 2014-11-24 CVE-2014-7821

OpenStack Neutron before 2014.1.4 and 2014.2.x before 2014.2.1 allows remote authenticated users to cause a denial of service (crash) via a crafted dns_nameservers value in the DNS configuration.

7.6 2014-10-07 CVE-2014-3632

The default configuration in a sudoers file in the Red Hat openstack-neutron package before 2014.1.2-4, as used in Red Hat Enterprise Linux Open Stack Platform 5.0 for Red Hat Enterprise Linux 6, allows remote attackers to gain privileges via a crafted configuration file. NOTE: this vulnerability exists because of a CVE-2013-6433 regression.

4 2014-10-02 CVE-2014-6414

OpenStack Neutron before 2014.2.4 and 2014.1 before 2014.1.2 allows remote authenticated users to set admin network attributes to default values via unspecified vectors.

5 2014-08-19 CVE-2014-4615

The notifier middleware in OpenStack PyCADF 0.5.0 and earlier, Telemetry (Ceilometer) 2013.2 before 2013.2.4 and 2014.x before 2014.1.2, Neutron 2014.x before 2014.1.2 and Juno before Juno-2, and Oslo allows remote authenticated users to obtain X_AUTH_TOKEN values by reading the message queue (v2/meters/http.request).

4 2014-07-23 CVE-2014-3555

OpenStack Neutron before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2 allows remote authenticated users to cause a denial of service (crash or long firewall rule updates) by creating a large number of allowed address pairs.

3.5 2014-07-11 CVE-2014-4167

The L3-agent in OpenStack Neutron before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2 allows remote authenticated users to cause a denial of service (IPv4 address attachment outage) by attaching an IPv6 private subnet to a L3 router.

7.6 2014-06-02 CVE-2013-6433

The default configuration in the Red Hat openstack-neutron package before 2013.2.3-7 does not properly set a configuration file for rootwrap, which allows remote attackers to gain privileges via a crafted configuration file.

2.1 2014-05-08 CVE-2014-0056

The l3-agent in OpenStack Neutron 2012.2 before 2013.2.3 does not check the tenant id when creating ports, which allows remote authenticated users to plug ports into the routers of arbitrary tenants via the device id in a port-create command.

9 2014-04-28 CVE-2014-0187

The openvswitch-agent process in OpenStack Neutron 2013.1 before 2013.2.4 and 2014.1 before 2014.1.1 allows remote authenticated users to bypass security group restrictions via an invalid CIDR in a security group rule, which prevents further rules from being applied.

CWE : Common Weakness Enumeration

%idName
28% (6) CWE-264 Permissions, Privileges, and Access Controls
19% (4) CWE-20 Improper Input Validation
14% (3) CWE-254 Security Features
4% (1) CWE-772 Missing Release of Resource after Effective Lifetime
4% (1) CWE-755 Improper Handling of Exceptional Conditions
4% (1) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
4% (1) CWE-399 Resource Management Errors
4% (1) CWE-362 Race Condition
4% (1) CWE-290 Authentication Bypass by Spoofing
4% (1) CWE-287 Improper Authentication
4% (1) CWE-200 Information Exposure

Oval Markup Language : Definitions

OvalID Name
oval:org.mitre.oval:def:24699 USN-2194-1 -- neutron vulnerability
oval:org.mitre.oval:def:24192 USN-2255-1 -- neutron vulnerabilities
oval:org.mitre.oval:def:26107 USN-2311-1 -- python-pycadf vulnerability
oval:org.mitre.oval:def:26638 USN-2311-2 -- ceilometer vulnerability
oval:org.mitre.oval:def:26106 USN-2321-1 -- neutron vulnerabilities
oval:org.mitre.oval:def:28174 USN-2408-1 -- OpenStack Neutron vulnerability

Nessus® Vulnerability Scanner

id Description
2015-04-22 Name: The remote Fedora host is missing a security update.
File: fedora_2015-5997.nasl - Type: ACT_GATHER_INFO
2015-01-19 Name: The remote Solaris system is missing a security patch for third-party software.
File: solaris11_neutron_20141120.nasl - Type: ACT_GATHER_INFO
2014-11-12 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-2408-1.nasl - Type: ACT_GATHER_INFO
2014-10-11 Name: The remote Fedora host is missing a security update.
File: fedora_2014-11892.nasl - Type: ACT_GATHER_INFO
2014-08-22 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-2311-2.nasl - Type: ACT_GATHER_INFO
2014-08-22 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-2321-1.nasl - Type: ACT_GATHER_INFO
2014-08-12 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-2311-1.nasl - Type: ACT_GATHER_INFO
2014-08-04 Name: The remote Fedora host is missing a security update.
File: fedora_2014-8743.nasl - Type: ACT_GATHER_INFO
2014-07-08 Name: The remote Fedora host is missing a security update.
File: fedora_2014-7780.nasl - Type: ACT_GATHER_INFO
2014-07-08 Name: The remote Fedora host is missing a security update.
File: fedora_2014-7799.nasl - Type: ACT_GATHER_INFO
2014-06-26 Name: The remote Fedora host is missing a security update.
File: fedora_2014-7446.nasl - Type: ACT_GATHER_INFO
2014-06-26 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-2255-1.nasl - Type: ACT_GATHER_INFO
2014-05-29 Name: The remote Fedora host is missing a security update.
File: fedora_2014-6520.nasl - Type: ACT_GATHER_INFO
2014-05-06 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-2194-1.nasl - Type: ACT_GATHER_INFO