CVE-2023-1668: CWE-670 in openvswitch
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.
AI Analysis
Technical Summary
CVE-2023-1668 is a high-severity vulnerability identified in Open vSwitch (OVS), an open-source multilayer virtual switch commonly used to provide network automation and virtual networking in cloud and data center environments. The flaw arises when OVS processes IP packets with the protocol field set to 0. In this scenario, OVS installs a datapath flow entry without correctly modifying the IP header as intended. This results in a datapath flow that matches all IP protocols (due to the nw_proto field being wildcarded) but contains an incorrect action. Consequently, other IP packets with protocols not equal to 0 that match this flow may be handled improperly. This behavior affects both kernel and userspace datapaths, potentially leading to incorrect packet forwarding or processing. The underlying weakness corresponds to CWE-670, which relates to the use of a risky function or method that can cause resource management issues or incorrect behavior. The vulnerability has a CVSS v3.1 base score of 8.2, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), low confidentiality impact (C:L), no integrity impact (I:N), and high availability impact (A:H). No known exploits have been reported in the wild as of the publication date (April 10, 2023), and no patches have been linked yet. The flaw could lead to denial of service or network disruption due to incorrect packet handling, affecting the availability of network services relying on OVS.
Potential Impact
For European organizations, especially those operating large-scale cloud infrastructures, data centers, or virtualized network environments, this vulnerability poses a significant risk. Open vSwitch is widely deployed in OpenStack, Kubernetes networking, and other SDN (Software Defined Networking) solutions prevalent in Europe’s telecom, finance, and public sectors. The incorrect handling of IP packets could cause network outages or degraded performance, impacting critical services and business continuity. Since the vulnerability can be exploited remotely without authentication or user interaction, attackers could trigger network disruptions at scale. This could affect multi-tenant cloud environments, leading to denial of service conditions for multiple customers. Additionally, the wildcarding of IP protocols in the flow entry could cause unintended traffic to be mishandled, potentially exposing network segments to traffic leakage or misrouting, which may have secondary confidentiality or compliance implications. The high availability impact is particularly concerning for sectors requiring stringent uptime guarantees such as healthcare, finance, and government services in Europe.
Mitigation Recommendations
1. Immediate mitigation should include monitoring and filtering network traffic to detect and block packets with IP protocol set to 0, which are uncommon and suspicious in most environments. 2. Network administrators should audit and restrict the use of Open vSwitch instances, especially those exposed to untrusted networks, and segment management interfaces to limit exposure. 3. Deploy strict flow rule validation and logging to detect anomalous flow installations that wildcard IP protocols unexpectedly. 4. Until an official patch is released, consider applying temporary workarounds such as disabling or limiting kernel datapath offloading features if feasible, or isolating vulnerable OVS instances behind additional firewall layers. 5. Engage with vendors and upstream projects to obtain patches or updates as soon as they become available and prioritize their deployment in production environments. 6. Conduct thorough testing of network functions post-patch to ensure that flow handling behaves correctly and no regressions occur. 7. Incorporate this vulnerability into incident response and threat hunting playbooks to quickly identify exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2023-1668: CWE-670 in openvswitch
Description
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.
AI-Powered Analysis
Technical Analysis
CVE-2023-1668 is a high-severity vulnerability identified in Open vSwitch (OVS), an open-source multilayer virtual switch commonly used to provide network automation and virtual networking in cloud and data center environments. The flaw arises when OVS processes IP packets with the protocol field set to 0. In this scenario, OVS installs a datapath flow entry without correctly modifying the IP header as intended. This results in a datapath flow that matches all IP protocols (due to the nw_proto field being wildcarded) but contains an incorrect action. Consequently, other IP packets with protocols not equal to 0 that match this flow may be handled improperly. This behavior affects both kernel and userspace datapaths, potentially leading to incorrect packet forwarding or processing. The underlying weakness corresponds to CWE-670, which relates to the use of a risky function or method that can cause resource management issues or incorrect behavior. The vulnerability has a CVSS v3.1 base score of 8.2, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), low confidentiality impact (C:L), no integrity impact (I:N), and high availability impact (A:H). No known exploits have been reported in the wild as of the publication date (April 10, 2023), and no patches have been linked yet. The flaw could lead to denial of service or network disruption due to incorrect packet handling, affecting the availability of network services relying on OVS.
Potential Impact
For European organizations, especially those operating large-scale cloud infrastructures, data centers, or virtualized network environments, this vulnerability poses a significant risk. Open vSwitch is widely deployed in OpenStack, Kubernetes networking, and other SDN (Software Defined Networking) solutions prevalent in Europe’s telecom, finance, and public sectors. The incorrect handling of IP packets could cause network outages or degraded performance, impacting critical services and business continuity. Since the vulnerability can be exploited remotely without authentication or user interaction, attackers could trigger network disruptions at scale. This could affect multi-tenant cloud environments, leading to denial of service conditions for multiple customers. Additionally, the wildcarding of IP protocols in the flow entry could cause unintended traffic to be mishandled, potentially exposing network segments to traffic leakage or misrouting, which may have secondary confidentiality or compliance implications. The high availability impact is particularly concerning for sectors requiring stringent uptime guarantees such as healthcare, finance, and government services in Europe.
Mitigation Recommendations
1. Immediate mitigation should include monitoring and filtering network traffic to detect and block packets with IP protocol set to 0, which are uncommon and suspicious in most environments. 2. Network administrators should audit and restrict the use of Open vSwitch instances, especially those exposed to untrusted networks, and segment management interfaces to limit exposure. 3. Deploy strict flow rule validation and logging to detect anomalous flow installations that wildcard IP protocols unexpectedly. 4. Until an official patch is released, consider applying temporary workarounds such as disabling or limiting kernel datapath offloading features if feasible, or isolating vulnerable OVS instances behind additional firewall layers. 5. Engage with vendors and upstream projects to obtain patches or updates as soon as they become available and prioritize their deployment in production environments. 6. Conduct thorough testing of network functions post-patch to ensure that flow handling behaves correctly and no regressions occur. 7. Incorporate this vulnerability into incident response and threat hunting playbooks to quickly identify exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2023-03-27T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9846c4522896dcbf4f7e
Added to database: 5/21/2025, 9:09:26 AM
Last enriched: 6/21/2025, 10:28:30 PM
Last updated: 10/16/2025, 3:16:00 PM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61543: n/a
HighCVE-2025-61541: n/a
HighCVE-2025-61536: n/a
HighCVE-2025-41254: CWE-352: Cross-Site Request Forgery (CSRF) in VMware Spring Framework
MediumCVE-2025-36002: Password in Configuration File in IBM Sterling B2B Integrator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.