Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2021-40085 CVE-2021-38598 |
CWE-ID | CWE-284 CWE-862 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
openstack-neutron Client/Desktop applications / Other client software |
Vendor | Openstack |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU57242
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-40085
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote user can bypass implemented security restrictions and reconfigure dnsmasq via a crafted extra_dhcp_opts value.
MitigationInstall updates from vendor's website.
Vulnerable software versionsopenstack-neutron: 16.0.0 - 18.1.0
CPE2.3https://security.openstack.org/ossa/OSSA-2021-005.html
https://launchpad.net/bugs/1939733
https://www.openwall.com/lists/oss-security/2021/08/31/2
https://lists.debian.org/debian-lts-announce/2021/10/msg00005.html
https://www.debian.org/security/2021/dsa-4983
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU57243
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-38598
CWE-ID:
CWE-862 - Missing Authorization
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists due to missing authorization when the linuxbridge driver with ebtables-nft is used on a Netfilter-based platform. A remote attacker in control of a server instance connected to the virtual switch can send specially crafted packets to impersonate the hardware addresses of other systems on the network.
MitigationInstall updates from vendor's website.
Vulnerable software versionsopenstack-neutron: 16.0.0 - 17.1.2
CPE2.3 External linkshttps://launchpad.net/bugs/1938670
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.