Input Validation Flaw in Floodlight Network Controller by Floodlight Project
CVE-2020-18685
9.8CRITICAL
Summary
Floodlight Network Controller version 1.2 contains an input validation flaw in the method checkFlow within StaticFlowEntryPusherResource.java. This vulnerability arises from inadequate checks for TCP or UDP ports, as well as group or table IDs. As a result, attackers could exploit this weakness to bypass intended flow rules, potentially leading to unauthorized access and alteration of network configurations.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved