Current Description
The Linux Foundation ONOS 2.0.0 and earlier is affected by: Poor Input-validation. The impact is: A network administrator (or attacker) can install unintended flow rules in the switch by mistake. The component is: createFlow() and createFlows() functions in FlowWebResource.java (RESTful service). The attack vector is: network management and connectivity.
Source:
MITRE
View Analysis Description
Analysis Description
The Linux Foundation ONOS 2.0.0 and earlier is affected by: Poor Input-validation. The impact is: A network administrator (or attacker) can install unintended flow rules in the switch by mistake. The component is: createFlow() and createFlows() functions in FlowWebResource.java (RESTful service). The attack vector is: network management and connectivity.
Source:
MITRE
Severity
CVSS 3.x Severity and Metrics:
Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
CVSS 2.0 Severity and Metrics:
Vector: (AV:N/AC:L/Au:S/C:N/I:P/A:P)
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because
they may have information that would be of interest to you. No inferences should be drawn on account of other sites
being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose.
NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further,
NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about
this page to nvd@nist.gov.
Weakness Enumeration
CWE-ID |
CWE Name |
Source |
CWE-20 |
Improper Input Validation |
NIST
|
Change History
1 change record found
- show changes
Initial Analysis -
7/25/2019 10:49:29 AM
Action |
Type |
Old Value |
New Value |
Added |
CPE Configuration |
|
OR
*cpe:2.3:o:linuxfoundation:open_network_operating_system:*:*:*:*:*:*:*:* versions up to (including) 2.0.0 |
Added |
CVSS V2 |
|
(AV:N/AC:L/Au:S/C:N/I:P/A:P) |
Added |
CVSS V3 |
|
AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N |
Added |
CWE |
|
CWE-20 |
Changed |
Reference Type |
https://drive.google.com/open?id=17RsaP67w6M2xquQjFf2vXhX3dlVKMdC1 No Types Assigned |
https://drive.google.com/open?id=17RsaP67w6M2xquQjFf2vXhX3dlVKMdC1 Exploit, Third Party Advisory |
Changed |
Reference Type |
https://drive.google.com/open?id=1HtdRdf88Nv3RNeQJM9fQ6egY5X-tuewD No Types Assigned |
https://drive.google.com/open?id=1HtdRdf88Nv3RNeQJM9fQ6egY5X-tuewD Exploit, Technical Description, Third Party Advisory |