hosttracker in OpenDaylight l2switch allows remote attackers to change the host location information by spoofing the MAC address, aka "topology spoofing."
References
| Link | Resource |
|---|---|
| http://www.internetsociety.org/sites/default/files/10_4_2.pdf | Technical Description |
| http://www.securityfocus.com/bid/73251 | Third Party Advisory VDB Entry |
| https://wiki.opendaylight.org/view/Security_Advisories#.5BModerate.5D_CVE-2015-1610_l2switch:_topology_spoofing_via_hosttracker | Vendor Advisory |
| http://www.internetsociety.org/sites/default/files/10_4_2.pdf | Technical Description |
| http://www.securityfocus.com/bid/73251 | Third Party Advisory VDB Entry |
| https://wiki.opendaylight.org/view/Security_Advisories#.5BModerate.5D_CVE-2015-1610_l2switch:_topology_spoofing_via_hosttracker | Vendor Advisory |
Configurations
History
21 Nov 2024, 02:25
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.internetsociety.org/sites/default/files/10_4_2.pdf - Technical Description | |
| References | () http://www.securityfocus.com/bid/73251 - Third Party Advisory, VDB Entry | |
| References | () https://wiki.opendaylight.org/view/Security_Advisories#.5BModerate.5D_CVE-2015-1610_l2switch:_topology_spoofing_via_hosttracker - Vendor Advisory |
Information
Published : 2017-03-20 16:59
Updated : 2025-04-20 01:37
NVD link : CVE-2015-1610
Mitre link : CVE-2015-1610
CVE.ORG link : CVE-2015-1610
JSON object : View
Products Affected
opendaylight
- l2switch
CWE
CWE-264
Permissions, Privileges, and Access Controls
