CVE-2024-46942: OpenDaylight Model-Driven Service Abstraction Layer (MD-SAL) allows follower controller to set up flow entries
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.11061%
CWE
Published
9/16/2024
Updated
11/18/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.opendaylight.mdsal:mdsal-artifacts | maven | <= 13.0.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper authorization (CWE-285) in MD-SAL's cluster role enforcement. Analysis suggests: 1) DataBroker.commit() is central to datastore modifications and would require leader role validation 2) RPC registration mechanisms appear to lack proper role checks based on the arXiv paper's description of control plane manipulation. While exact code references are unavailable, these components handle critical write operations and RPC services that align with the described attack vector. Confidence is medium due to the indirect evidence from vulnerability descriptions and architectural understanding of OpenDaylight's MD-SAL components.