Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 5 |
CVE-ID | CVE-2021-20267 CVE-2021-38598 CVE-2021-40085 CVE-2021-40797 CVE-2022-3277 |
CWE-ID | CWE-345 CWE-862 CWE-284 CWE-400 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Ubuntu Operating systems & Components / Operating system python-neutron (Ubuntu package) Operating systems & Components / Operating system package or component python3-neutron (Ubuntu package) Operating systems & Components / Operating system package or component |
Vendor | Canonical Ltd. |
Security Bulletin
This security bulletin contains information about 5 vulnerabilities.
EUVDB-ID: #VU76079
Risk: Medium
CVSSv4.0: [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-20267
CWE-ID:
CWE-345 - Insufficient Verification of Data Authenticity
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists due to insufficient verification of data authenticity when processing IPv6 packets in openstack-neutron's default Open vSwitch firewall rules. A remote attacker in control of a server instance connected to the virtual switch can
impersonate the IPv6 addresses of other systems on the network and intercept traffic or perform a denial of service (DoS) attack.
Update the affected package neutron to the latest version.
Vulnerable software versionsUbuntu: 18.04 - 22.04
python-neutron (Ubuntu package): before 2:12.1.1-0ubuntu8.1
python3-neutron (Ubuntu package): before 2:16.4.2-0ubuntu6.2
CPE2.3http://ubuntu.com/security/notices/USN-6067-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU57243
Risk: Low
CVSSv4.0: [CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-38598
CWE-ID:
CWE-862 - Missing Authorization
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists due to missing authorization when the linuxbridge driver with ebtables-nft is used on a Netfilter-based platform. A remote attacker in control of a server instance connected to the virtual switch can send specially crafted packets to impersonate the hardware addresses of other systems on the network.
MitigationUpdate the affected package neutron to the latest version.
Vulnerable software versionsUbuntu: 18.04 - 22.04
python-neutron (Ubuntu package): before 2:12.1.1-0ubuntu8.1
python3-neutron (Ubuntu package): before 2:16.4.2-0ubuntu6.2
CPE2.3http://ubuntu.com/security/notices/USN-6067-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU57242
Risk: Low
CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-40085
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote user can bypass implemented security restrictions and reconfigure dnsmasq via a crafted extra_dhcp_opts value.
MitigationUpdate the affected package neutron to the latest version.
Vulnerable software versionsUbuntu: 18.04 - 22.04
python-neutron (Ubuntu package): before 2:12.1.1-0ubuntu8.1
python3-neutron (Ubuntu package): before 2:16.4.2-0ubuntu6.2
CPE2.3http://ubuntu.com/security/notices/USN-6067-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU59320
Risk: Medium
CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-40797
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources when processing API calls to nonexistent controllers. A remote authenticated user can trigger resource exhaustion by sending multiple API calls and perform a denial of service (DoS) attack.
MitigationUpdate the affected package neutron to the latest version.
Vulnerable software versionsUbuntu: 18.04 - 22.04
python-neutron (Ubuntu package): before 2:12.1.1-0ubuntu8.1
python3-neutron (Ubuntu package): before 2:16.4.2-0ubuntu6.2
CPE2.3http://ubuntu.com/security/notices/USN-6067-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU70048
Risk: Medium
CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-3277
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources when the user queries a list of security groups for an invalid project. A remote user can trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationUpdate the affected package neutron to the latest version.
Vulnerable software versionsUbuntu: 18.04 - 22.04
python-neutron (Ubuntu package): before 2:12.1.1-0ubuntu8.1
python3-neutron (Ubuntu package): before 2:16.4.2-0ubuntu6.2
CPE2.3http://ubuntu.com/security/notices/USN-6067-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.