The OpenDaylight 0.15.3 controller allows topology poisoning via API requests because an application can manipulate the path that is taken by discovery packets.
Metrics
Affected Vendors & Products
References
History
Mon, 16 Dec 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linuxfoundation
Linuxfoundation opendaylight |
|
CPEs | cpe:2.3:a:linuxfoundation:opendaylight:0.15.3:*:*:*:*:*:*:* | |
Vendors & Products |
Linuxfoundation
Linuxfoundation opendaylight |
|
References |
| |
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T15:59:47.007Z
Reserved: 2024-05-31T00:00:00.000Z
Link: CVE-2024-37018

Updated: 2024-08-02T03:43:50.672Z

Status : Awaiting Analysis
Published: 2024-05-31T01:15:54.323
Modified: 2024-12-16T21:15:07.897
Link: CVE-2024-37018

No data.