Lucene search

K
cveRedhatCVE-2023-3637
HistoryJul 25, 2023 - 1:15 p.m.

CVE-2023-3637

2023-07-2513:15:10
CWE-400
redhat
web.nvd.nist.gov
72
cve-2023-3637
openstack-neutron
resource consumption
denial of service
nvd

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.2

Confidence

High

EPSS

0.001

Percentile

47.0%

An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user’s quota. If a malicious user were to submit a significant number of requests, this could lead to a denial of service.

Affected configurations

Nvd
Node
redhatopenstack_platformMatch13.0
OR
redhatopenstack_platformMatch16.2
VendorProductVersionCPE
redhatopenstack_platform13.0cpe:2.3:a:redhat:openstack_platform:13.0:*:*:*:*:*:*:*
redhatopenstack_platform16.2cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Red Hat",
    "product": "Red Hat OpenStack Platform 16.2",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "openstack-neutron",
    "defaultStatus": "affected",
    "versions": [
      {
        "version": "1:15.3.5-2.20230216175503.el8ost",
        "lessThan": "*",
        "versionType": "rpm",
        "status": "unaffected"
      }
    ],
    "cpes": [
      "cpe:/a:redhat:openstack:16.2::el8"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat OpenStack Platform 13 (Queens) Operational Tools",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "openstack-neutron",
    "defaultStatus": "affected",
    "cpes": [
      "cpe:/a:redhat:openstack-optools:13"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat OpenStack Platform 16.1",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "openstack-neutron",
    "defaultStatus": "unaffected",
    "cpes": [
      "cpe:/a:redhat:openstack:16.1"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat OpenStack Platform 17.0",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "openstack-neutron",
    "defaultStatus": "unaffected",
    "cpes": [
      "cpe:/a:redhat:openstack:17.0"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat OpenStack Platform 17.1",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "openstack-neutron",
    "defaultStatus": "unaffected",
    "cpes": [
      "cpe:/a:redhat:openstack:17.1"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat OpenStack Platform 18.0",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "openstack-neutron",
    "defaultStatus": "unaffected",
    "cpes": [
      "cpe:/a:redhat:openstack:18.0"
    ]
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.2

Confidence

High

EPSS

0.001

Percentile

47.0%