Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51406: n/a

0
Medium
VulnerabilityCVE-2024-51406cvecve-2024-51406
Published: Fri Nov 01 2024 (11/01/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Floodlight SDN Open Flow Controller v.1.2 has an issue that allows local hosts to build fake LLDP packets that allow specific clusters to be missed by Floodlight, which in turn leads to missed hosts inside and outside the cluster.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 02:57:22 UTC

Technical Analysis

The vulnerability identified as CVE-2024-51406 affects Floodlight SDN Open Flow Controller version 1.2. It arises from the controller's improper handling of Link Layer Discovery Protocol (LLDP) packets. Specifically, local hosts can generate and send crafted fake LLDP packets that deceive the controller into missing certain network clusters. LLDP is used by SDN controllers like Floodlight to discover and maintain an accurate view of the network topology. By injecting fake LLDP packets, an attacker can cause the controller to omit clusters from its topology map, leading to hosts within and outside those clusters being unrecognized. This results in incomplete network visibility and potential disruption of network functions that depend on accurate topology information. The vulnerability has a CVSS 3.1 base score of 6.2, reflecting a medium severity level. The vector indicates local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No patches or exploits are currently documented, but the flaw could be leveraged to degrade network monitoring and management capabilities.

Potential Impact

This vulnerability primarily impacts the availability and reliability of network topology information within organizations using Floodlight SDN Open Flow Controller v1.2. By causing the controller to miss clusters and hosts, network administrators may lose visibility into parts of their network, which can hinder troubleshooting, network optimization, and security monitoring. This blind spot could be exploited by attackers to hide malicious activities or lateral movement within the network. Although it does not directly compromise confidentiality or integrity, the loss of accurate topology data can indirectly facilitate further attacks or operational disruptions. Organizations with critical infrastructure or large-scale SDN deployments relying on Floodlight may face increased risk of network outages or degraded performance. The requirement for local access limits the scope of exploitation but insider threats or compromised internal hosts could leverage this vulnerability.

Mitigation Recommendations

To mitigate CVE-2024-51406, organizations should first verify if they are running Floodlight SDN Open Flow Controller version 1.2 and assess exposure to local host threats. Since no official patch is currently available, network administrators should implement strict network segmentation and access controls to limit local host access to the controller environment. Monitoring and filtering LLDP traffic for anomalies or unexpected sources can help detect attempts to inject fake LLDP packets. Employing host-based security controls to prevent unauthorized packet crafting on local hosts is recommended. Additionally, consider deploying complementary network monitoring tools that do not solely rely on LLDP for topology discovery to cross-verify network state. Stay alert for vendor updates or patches addressing this vulnerability and apply them promptly once released. Conduct regular security audits and penetration tests focusing on SDN controller environments to identify similar weaknesses.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bb1b7ef31ef0b55a25d

Added to database: 2/25/2026, 9:37:53 PM

Last enriched: 2/28/2026, 2:57:22 AM

Last updated: 4/11/2026, 7:05:14 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses