Show filters
52 Total Results
Displaying 41-50 of 52
Sort by:
Attacker Value
Unknown

CVE-2022-29607

Disclosure Date: April 20, 2023 (last updated October 08, 2023)
An issue was discovered in ONOS 2.5.1. Modification of an existing intent to have the same source and destination shows the INSTALLED state without any flow rule. Improper handling of such an intent is misleading to a network operator.
Attacker Value
Unknown

CVE-2022-29606

Disclosure Date: April 20, 2023 (last updated October 08, 2023)
An issue was discovered in ONOS 2.5.1. An intent with a large port number shows the CORRUPT state, which is misleading to a network operator. Improper handling of such port numbers causes inconsistency between intent and flow rules in the network.
Attacker Value
Unknown

CVE-2022-29605

Disclosure Date: April 20, 2023 (last updated October 08, 2023)
An issue was discovered in ONOS 2.5.1. IntentManager attempts to install the IPv6 flow rules of an intent into an OpenFlow 1.0 switch that does not support IPv6. Improper handling of the difference in capabilities of the intent and switch is misleading to a network operator.
Attacker Value
Unknown

CVE-2022-29604

Disclosure Date: April 20, 2023 (last updated October 08, 2023)
An issue was discovered in ONOS 2.5.1. An intent with an uppercase letter in a device ID shows the CORRUPT state, which is misleading to a network operator. Improper handling of case sensitivity causes inconsistency between intent and flow rules in the network.
Attacker Value
Unknown

CVE-2022-24109

Disclosure Date: April 20, 2023 (last updated October 08, 2023)
An issue was discovered in ONOS 2.5.1. To attack an intent installed by a normal user, a remote attacker can install a duplicate intent with a different key, and then remove the duplicate one. This will remove the flow rules of the intent, even though the intent still exists in the controller.
Attacker Value
Unknown

CVE-2022-24035

Disclosure Date: April 20, 2023 (last updated October 08, 2023)
An issue was discovered in ONOS 2.5.1. The purge-requested intent remains on the list, but it does not respond to changes in topology (e.g., link failure). In combination with other applications, it could lead to a failure of network management.
Attacker Value
Unknown

CVE-2021-38364

Disclosure Date: April 20, 2023 (last updated October 08, 2023)
An issue was discovered in ONOS 2.5.1. There is an incorrect comparison of flow rules installed by intents. A remote attacker can install or remove a new intent, and consequently modify or delete the existing flow rules related to other intents.
Attacker Value
Unknown

CVE-2021-38363

Disclosure Date: April 20, 2023 (last updated October 08, 2023)
An issue was discovered in ONOS 2.5.1. In IntentManager, the install-requested intent (which causes an exception) remains in pendingMap (in memory) forever. Deletion is possible neither by a user nor by the intermittent Intent Cleanup process.
Attacker Value
Unknown

CVE-2023-24279

Disclosure Date: March 14, 2023 (last updated October 08, 2023)
A cross-site scripting (XSS) vulnerability in Open Networking Foundation ONOS from version v1.9.0 to v2.7.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the url parameter of the API documentation dashboard.
Attacker Value
Unknown

CVE-2019-11189

Disclosure Date: February 20, 2020 (last updated February 21, 2025)
Authentication Bypass by Spoofing in org.onosproject.acl (access control) and org.onosproject.mobility (host mobility) in ONOS v2.0 and earlier allows attackers to bypass network access control via data plane packet injection. To exploit the vulnerability, an attacker sends a gratuitous ARP reply that causes the host mobility application to remove existing access control flow denial rules in the network. The access control application does not re-install flow deny rules, so the attacker can bypass the intended access control policy.