CVE-2023-3153
Service monitor mac flow is not rate limited
Severity Score
5.3
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Attend
*SSVC
Descriptions
A flaw was found in Open Virtual Network where the service monitor MAC does not properly rate limit. This issue could allow an attacker to cause a denial of service, including on deployments with CoPP enabled and properly configured.
Se encontró una falla en Open Virtual Network donde el monitor de servicio MAC no califica correctamente el límite. Este problema podría permitir que un atacante provoque una denegación de servicio, incluso en implementaciones con CoPP habilitado y configurado correctamente.
*Credits:
This issue was discovered by Ales Musil (Red Hat).
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Attend
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2023-06-07 CVE Reserved
- 2023-10-04 CVE Published
- 2024-09-19 CVE Updated
- 2024-11-05 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-400: Uncontrolled Resource Consumption
- CWE-770: Allocation of Resources Without Limits or Throttling
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://github.com/ovn-org/ovn/issues/198 | Issue Tracking |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2023-3153 | 2023-11-07 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2213279 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Fast Datapath Search vendor "Redhat" for product "Fast Datapath" | - | - |
Affected
| in | Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 9.0 Search vendor "Redhat" for product "Enterprise Linux" and version "9.0" | - |
Safe
|
Ovn Search vendor "Ovn" | Open Virtual Network Search vendor "Ovn" for product "Open Virtual Network" | < 22.03.3 Search vendor "Ovn" for product "Open Virtual Network" and version " < 22.03.3" | - |
Affected
| ||||||
Ovn Search vendor "Ovn" | Open Virtual Network Search vendor "Ovn" for product "Open Virtual Network" | >= 22.03.4 < 22.09.2 Search vendor "Ovn" for product "Open Virtual Network" and version " >= 22.03.4 < 22.09.2" | - |
Affected
| ||||||
Ovn Search vendor "Ovn" | Open Virtual Network Search vendor "Ovn" for product "Open Virtual Network" | >= 22.09.3 < 22.12.1 Search vendor "Ovn" for product "Open Virtual Network" and version " >= 22.09.3 < 22.12.1" | - |
Affected
| ||||||
Ovn Search vendor "Ovn" | Open Virtual Network Search vendor "Ovn" for product "Open Virtual Network" | >= 22.12.2 < 23.03.1 Search vendor "Ovn" for product "Open Virtual Network" and version " >= 22.12.2 < 23.03.1" | - |
Affected
| ||||||
Ovn Search vendor "Ovn" | Open Virtual Network Search vendor "Ovn" for product "Open Virtual Network" | >= 23.03.2 < 23.06.1 Search vendor "Ovn" for product "Open Virtual Network" and version " >= 23.03.2 < 23.06.1" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Openshift Container Platform Search vendor "Redhat" for product "Openshift Container Platform" | 4.0 Search vendor "Redhat" for product "Openshift Container Platform" and version "4.0" | - |
Affected
|