Filtered by vendor Opennetworking
Subscribe
Total
57 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-41591 | 1 Opennetworking | 1 Onos | 2025-06-03 | N/A | N/A |
An issue in Open Network Foundation ONOS v2.7.0 allows attackers to create fake IP/MAC addresses and potentially execute a man-in-the-middle attack on communications between fake and real hosts. | |||||
CVE-2024-53423 | 1 Opennetworking | 1 Onos | 2025-06-03 | N/A | N/A |
An issue in Open Network Foundation ONOS v2.7.0 allows attackers to cause a Denial of Service (DoS) via supplying crafted packets. | |||||
CVE-2025-29310 | 1 Opennetworking | 1 Onos | 2025-04-01 | N/A | N/A |
An issue in onos v2.7.0 allows attackers to trigger a packet deserialization problem when supplying a crafted LLDP packet. This vulnerability allows attackers to execute arbitrary commands or access network information. | |||||
CVE-2025-29311 | 1 Opennetworking | 1 Onos | 2025-04-01 | N/A | N/A |
Limited secret space in LLDP packets used in onos v2.7.0 allows attackers to obtain the private key via a bruteforce attack. Attackers are able to leverage this vulnerability into creating crafted LLDP packets. | |||||
CVE-2025-29312 | 1 Opennetworking | 1 Onos | 2025-04-01 | N/A | N/A |
An issue in onos v2.7.0 allows attackers to trigger unexpected behavior within a device connected to a legacy switch via changing the link type from indirect to direct. | |||||
CVE-2021-38364 | 1 Opennetworking | 1 Onos | 2025-02-05 | N/A | 6.5 MEDIUM |
An issue was discovered in ONOS 2.5.1. There is an incorrect comparison of flow rules installed by intents. A remote attacker can install or remove a new intent, and consequently modify or delete the existing flow rules related to other intents. | |||||
CVE-2022-29609 | 1 Opennetworking | 1 Onos | 2025-02-05 | N/A | 5.3 MEDIUM |
An issue was discovered in ONOS 2.5.1. An intent with the same source and destination shows the INSTALLING state, indicating that its flow rules are installing. Improper handling of such an intent is misleading to a network operator. | |||||
CVE-2022-29605 | 1 Opennetworking | 1 Onos | 2025-02-05 | N/A | 7.5 HIGH |
An issue was discovered in ONOS 2.5.1. IntentManager attempts to install the IPv6 flow rules of an intent into an OpenFlow 1.0 switch that does not support IPv6. Improper handling of the difference in capabilities of the intent and switch is misleading to a network operator. | |||||
CVE-2022-29604 | 1 Opennetworking | 1 Onos | 2025-02-05 | N/A | 9.8 CRITICAL |
An issue was discovered in ONOS 2.5.1. An intent with an uppercase letter in a device ID shows the CORRUPT state, which is misleading to a network operator. Improper handling of case sensitivity causes inconsistency between intent and flow rules in the network. | |||||
CVE-2021-38363 | 1 Opennetworking | 1 Onos | 2025-02-05 | N/A | 7.5 HIGH |
An issue was discovered in ONOS 2.5.1. In IntentManager, the install-requested intent (which causes an exception) remains in pendingMap (in memory) forever. Deletion is possible neither by a user nor by the intermittent Intent Cleanup process. | |||||
CVE-2022-24035 | 1 Opennetworking | 1 Onos | 2025-02-05 | N/A | 7.5 HIGH |
An issue was discovered in ONOS 2.5.1. The purge-requested intent remains on the list, but it does not respond to changes in topology (e.g., link failure). In combination with other applications, it could lead to a failure of network management. | |||||
CVE-2022-24109 | 1 Opennetworking | 1 Onos | 2025-02-05 | N/A | 6.5 MEDIUM |
An issue was discovered in ONOS 2.5.1. To attack an intent installed by a normal user, a remote attacker can install a duplicate intent with a different key, and then remove the duplicate one. This will remove the flow rules of the intent, even though the intent still exists in the controller. | |||||
CVE-2022-29944 | 1 Opennetworking | 1 Onos | 2025-02-05 | N/A | 5.3 MEDIUM |
An issue was discovered in ONOS 2.5.1. There is an incorrect comparison of paths installed by intents. An existing intents does not redirect to a new path, even if a new intent that shares the path with higher priority is installed. | |||||
CVE-2022-29608 | 1 Opennetworking | 1 Onos | 2025-02-05 | N/A | 7.5 HIGH |
An issue was discovered in ONOS 2.5.1. An intent with a port that is an intermediate point of its path installs an invalid flow rule, causing a network loop. | |||||
CVE-2022-29606 | 1 Opennetworking | 1 Onos | 2025-02-05 | N/A | 9.8 CRITICAL |
An issue was discovered in ONOS 2.5.1. An intent with a large port number shows the CORRUPT state, which is misleading to a network operator. Improper handling of such port numbers causes inconsistency between intent and flow rules in the network. | |||||
CVE-2022-29607 | 1 Opennetworking | 1 Onos | 2025-02-05 | N/A | 7.5 HIGH |
An issue was discovered in ONOS 2.5.1. Modification of an existing intent to have the same source and destination shows the INSTALLED state without any flow rule. Improper handling of such an intent is misleading to a network operator. | |||||
CVE-2024-31164 | 1 Opennetworking | 1 Libfluid Msg | 2024-09-20 | N/A | 7.5 HIGH |
Unchecked Return Value to NULL Pointer Dereference vulnerability in Open Networking Foundation (ONF) libfluid (libfluid_msg module). This vulnerability is associated with program routines fluid_msg::ActionList::unpack13. This issue affects libfluid: 0.1.0. | |||||
CVE-2024-23916 | 1 Opennetworking | 1 Libfluid Msg | 2024-09-20 | N/A | 7.5 HIGH |
Unchecked Return Value to NULL Pointer Dereference vulnerability in Open Networking Foundation (ONF) libfluid (libfluid_msg module). This vulnerability is associated with program routines fluid_msg::ActionSet::unpack. This issue affects libfluid: 0.1.0. | |||||
CVE-2024-23915 | 1 Opennetworking | 1 Libfluid Msg | 2024-09-20 | N/A | 7.5 HIGH |
Unchecked Return Value to NULL Pointer Dereference vulnerability in Open Networking Foundation (ONF) libfluid (libfluid_msg module). This vulnerability is associated with program routines fluid_msg::of13::InstructionSet::unpack. This issue affects libfluid: 0.1.0. | |||||
CVE-2024-31165 | 1 Opennetworking | 1 Libfluid Msg | 2024-09-20 | N/A | 7.5 HIGH |
Unchecked Return Value to NULL Pointer Dereference vulnerability in Open Networking Foundation (ONF) libfluid (libfluid_msg module). This vulnerability is associated with program routineĀ fluid_msg::of13::SetFieldAction::unpack. This issue affects libfluid: 0.1.0. |