{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T20:39:19.933","vulnerabilities":[{"cve":{"id":"CVE-2018-14636","sourceIdentifier":"secalert@redhat.com","published":"2018-09-10T19:29:00.407","lastModified":"2024-11-21T03:49:28.863","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Live-migrated instances are briefly able to inspect traffic for other instances on the same hypervisor. This brief window could be extended indefinitely if the instance's port is set administratively down prior to live-migration and kept down after the migration is complete. This is possible due to the Open vSwitch integration bridge being connected to the instance during migration. When connected to the integration bridge, all traffic for instances using the same Open vSwitch instance would potentially be visible to the migrated guest, as the required Open vSwitch VLAN filters are only applied post-migration. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3, 11.0.5 are vulnerable."},{"lang":"es","value":"Las instancias migradas en vivo son capaces de inspeccionar brevemente tráfico para otras instancias del mismo hipervisor. Este breve período de tiempo podría extenderse indefinidamente si el puerto de la instancia se configura de forma administrativa antes de la migración en vivo y se mantiene caído una vez se completa la migración. Esto es posible debido a que el puente de integración de Open vSwitch se conecta a la instancia durante la migración. Al conectarse al puente de integración, todo el tráfico para las instancias que emplean la misma instancia de Open vSwitch serían visibles para el invitado migrado, ya que los filtros VLAN de Open vSwitch necesarios solo se aplican tras la migración. Las versiones de openstack-neutron anteriores a la 13.0.0.0b2, 12.0.3 y 11.0.5 son vulnerables."}],"metrics":{"cvssMetricV30":[{"source":"secalert@redhat.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:P/I:N/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"secalert@redhat.com","type":"Secondary","description":[{"lang":"en","value":"CWE-300"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0.0","versionEndIncluding":"11.0.4","matchCriteriaId":"F698F960-65DD-4374-ADE9-8971ADB57030"},{"vulnerable":true,"criteria":"cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0.0","versionEndIncluding":"12.0.2","matchCriteriaId":"52B626FD-5547-4E6D-B7AD-76B96FDFE56F"},{"vulnerable":true,"criteria":"cpe:2.3:a:openstack:neutron:13.0.0:b1:*:*:*:*:*:*","matchCriteriaId":"2DC16584-6072-4821-BEA6-4042FEAEB205"}]}]}],"references":[{"url":"https://bugs.launchpad.net/neutron/+bug/1734320","source":"secalert@redhat.com","tags":["Issue Tracking","Third Party Advisory"]},{"url":"https://bugs.launchpad.net/neutron/+bug/1767422","source":"secalert@redhat.com","tags":["Issue Tracking","Third Party Advisory"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14636","source":"secalert@redhat.com","tags":["Issue Tracking","Third Party Advisory"]},{"url":"https://bugs.launchpad.net/neutron/+bug/1734320","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Third Party Advisory"]},{"url":"https://bugs.launchpad.net/neutron/+bug/1767422","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Third Party Advisory"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14636","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Third Party Advisory"]}]}}]}