Description
A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.
Published: 2023-10-06
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3734-1 openvswitch security update
Debian DSA Debian DSA DSA-5640-1 openvswitch security update
EUVD EUVD EUVD-2023-57682 A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.
Ubuntu USN Ubuntu USN USN-6514-1 Open vSwitch vulnerability
Ubuntu USN Ubuntu USN USN-6690-1 Open vSwitch vulnerabilities
History

No history.

Subscriptions

Openvswitch Openvswitch
Redhat Enterprise Linux Fast Datapath Openshift Openshift Container Platform Openstack Virtualization
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-02-13T17:20:09.786Z

Reserved: 2023-10-03T19:14:58.793Z

Link: CVE-2023-5366

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-10-06T18:15:12.520

Modified: 2024-11-21T08:41:37.093

Link: CVE-2023-5366

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-09-26T00:00:00Z

Links: CVE-2023-5366 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses