CVE-2024-37018

The OpenDaylight 0.15.3 controller allows topology poisoning via API requests because an application can manipulate the path that is taken by discovery packets.
Configurations

No configuration.

History

21 Nov 2024, 09:23

Type Values Removed Values Added
References () https://jira.opendaylight.org/browse/DISCOVERY-2 - () https://jira.opendaylight.org/browse/DISCOVERY-2 -
References () https://mvnrepository.com/artifact/org.opendaylight.controller - () https://mvnrepository.com/artifact/org.opendaylight.controller -

05 Aug 2024, 16:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
CWE CWE-648
Summary
  • (es) El controlador OpenDaylight 0.15.3 permite el envenenamiento de la topología a través de solicitudes API porque una aplicación puede manipular la ruta que toman los paquetes de descubrimiento.

31 May 2024, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-31 01:15

Updated : 2024-11-21 09:23


NVD link : CVE-2024-37018

Mitre link : CVE-2024-37018

CVE.ORG link : CVE-2024-37018


JSON object : View

Products Affected

No product.

CWE
CWE-648

Incorrect Use of Privileged APIs