// For flags

CVE-2020-35498

openvswitch: limitation in the OVS packet parsing in userspace leads to DoS

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.

Se encontró una vulnerabilidad en openvswitch. Una limitación en la implementación del análisis de paquetes del espacio de usuario puede permitir a un usuario malicioso envíe un paquete especialmente diseñado, lo que hace que el megaflujo resultante en el kernel sea demasiado amplio, causando potencialmente una denegación de servicio. La mayor amenaza de esta vulnerabilidad es la disponibilidad del sistema

Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.7.4.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2020-12-17 CVE Reserved
  • 2021-02-11 CVE Published
  • 2021-02-12 First Exploit
  • 2025-04-23 CVE Updated
  • 2025-05-05 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-400: Uncontrolled Resource Consumption
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Openvswitch
Search vendor "Openvswitch"
Openvswitch
Search vendor "Openvswitch" for product "Openvswitch"
>= 2.5.0 < 2.5.12
Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.5.0 < 2.5.12"
-
Affected
Openvswitch
Search vendor "Openvswitch"
Openvswitch
Search vendor "Openvswitch" for product "Openvswitch"
>= 2.6.0 < 2.6.10
Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.6.0 < 2.6.10"
-
Affected
Openvswitch
Search vendor "Openvswitch"
Openvswitch
Search vendor "Openvswitch" for product "Openvswitch"
>= 2.7.0 < 2.7.13
Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.7.0 < 2.7.13"
-
Affected
Openvswitch
Search vendor "Openvswitch"
Openvswitch
Search vendor "Openvswitch" for product "Openvswitch"
>= 2.8.0 < 2.8.11
Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.8.0 < 2.8.11"
-
Affected
Openvswitch
Search vendor "Openvswitch"
Openvswitch
Search vendor "Openvswitch" for product "Openvswitch"
>= 2.9.0 < 2.9.9
Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.9.0 < 2.9.9"
-
Affected
Openvswitch
Search vendor "Openvswitch"
Openvswitch
Search vendor "Openvswitch" for product "Openvswitch"
>= 2.10.0 < 2.10.7
Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.10.0 < 2.10.7"
-
Affected
Openvswitch
Search vendor "Openvswitch"
Openvswitch
Search vendor "Openvswitch" for product "Openvswitch"
>= 2.11.0 < 2.11.6
Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.11.0 < 2.11.6"
-
Affected
Openvswitch
Search vendor "Openvswitch"
Openvswitch
Search vendor "Openvswitch" for product "Openvswitch"
>= 2.12.0 < 2.12.3
Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.12.0 < 2.12.3"
-
Affected
Openvswitch
Search vendor "Openvswitch"
Openvswitch
Search vendor "Openvswitch" for product "Openvswitch"
>= 2.13.0 < 2.13.3
Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.13.0 < 2.13.3"
-
Affected
Openvswitch
Search vendor "Openvswitch"
Openvswitch
Search vendor "Openvswitch" for product "Openvswitch"
>= 2.14.0 < 2.14.2
Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.14.0 < 2.14.2"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
9.0
Search vendor "Debian" for product "Debian Linux" and version "9.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
10.0
Search vendor "Debian" for product "Debian Linux" and version "10.0"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
33
Search vendor "Fedoraproject" for product "Fedora" and version "33"
-
Affected