Skip to main content

CVE-2023-1668: CWE-670 in openvswitch

High
VulnerabilityCVE-2023-1668cvecve-2023-1668cwe-670
Published: Mon Apr 10 2023 (04/10/2023, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: openvswitch

Description

A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.

AI-Powered Analysis

AILast updated: 06/21/2025, 22:28:30 UTC

Technical Analysis

CVE-2023-1668 is a high-severity vulnerability identified in Open vSwitch (OVS), an open-source multilayer virtual switch commonly used to provide network automation and virtual networking in cloud and data center environments. The flaw arises when OVS processes IP packets with the protocol field set to 0. In this scenario, OVS installs a datapath flow entry without correctly modifying the IP header as intended. This results in a datapath flow that matches all IP protocols (due to the nw_proto field being wildcarded) but contains an incorrect action. Consequently, other IP packets with protocols not equal to 0 that match this flow may be handled improperly. This behavior affects both kernel and userspace datapaths, potentially leading to incorrect packet forwarding or processing. The underlying weakness corresponds to CWE-670, which relates to the use of a risky function or method that can cause resource management issues or incorrect behavior. The vulnerability has a CVSS v3.1 base score of 8.2, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), low confidentiality impact (C:L), no integrity impact (I:N), and high availability impact (A:H). No known exploits have been reported in the wild as of the publication date (April 10, 2023), and no patches have been linked yet. The flaw could lead to denial of service or network disruption due to incorrect packet handling, affecting the availability of network services relying on OVS.

Potential Impact

For European organizations, especially those operating large-scale cloud infrastructures, data centers, or virtualized network environments, this vulnerability poses a significant risk. Open vSwitch is widely deployed in OpenStack, Kubernetes networking, and other SDN (Software Defined Networking) solutions prevalent in Europe’s telecom, finance, and public sectors. The incorrect handling of IP packets could cause network outages or degraded performance, impacting critical services and business continuity. Since the vulnerability can be exploited remotely without authentication or user interaction, attackers could trigger network disruptions at scale. This could affect multi-tenant cloud environments, leading to denial of service conditions for multiple customers. Additionally, the wildcarding of IP protocols in the flow entry could cause unintended traffic to be mishandled, potentially exposing network segments to traffic leakage or misrouting, which may have secondary confidentiality or compliance implications. The high availability impact is particularly concerning for sectors requiring stringent uptime guarantees such as healthcare, finance, and government services in Europe.

Mitigation Recommendations

1. Immediate mitigation should include monitoring and filtering network traffic to detect and block packets with IP protocol set to 0, which are uncommon and suspicious in most environments. 2. Network administrators should audit and restrict the use of Open vSwitch instances, especially those exposed to untrusted networks, and segment management interfaces to limit exposure. 3. Deploy strict flow rule validation and logging to detect anomalous flow installations that wildcard IP protocols unexpectedly. 4. Until an official patch is released, consider applying temporary workarounds such as disabling or limiting kernel datapath offloading features if feasible, or isolating vulnerable OVS instances behind additional firewall layers. 5. Engage with vendors and upstream projects to obtain patches or updates as soon as they become available and prioritize their deployment in production environments. 6. Conduct thorough testing of network functions post-patch to ensure that flow handling behaves correctly and no regressions occur. 7. Incorporate this vulnerability into incident response and threat hunting playbooks to quickly identify exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2023-03-27T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9846c4522896dcbf4f7e

Added to database: 5/21/2025, 9:09:26 AM

Last enriched: 6/21/2025, 10:28:30 PM

Last updated: 8/13/2025, 8:06:45 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats