{"api_version":"1","generated_at":"2026-04-23T11:34:01+00:00","cve":"CVE-2018-14636","urls":{"html":"https://cve.report/CVE-2018-14636","api":"https://cve.report/api/cve/CVE-2018-14636.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-14636","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-14636"},"summary":{"title":"CVE-2018-14636","description":"Live-migrated instances are briefly able to inspect traffic for other instances on the same hypervisor. This brief window could be extended indefinitely if the instance's port is set administratively down prior to live-migration and kept down after the migration is complete. This is possible due to the Open vSwitch integration bridge being connected to the instance during migration. When connected to the integration bridge, all traffic for instances using the same Open vSwitch instance would potentially be visible to the migrated guest, as the required Open vSwitch VLAN filters are only applied post-migration. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3, 11.0.5 are vulnerable.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2018-09-10 19:29:00","updated_at":"2019-10-09 23:35:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://bugs.launchpad.net/neutron/+bug/1767422","name":"https://bugs.launchpad.net/neutron/+bug/1767422","refsource":"CONFIRM","tags":["Issue Tracking","Third Party Advisory"],"title":"Bug #1767422 “Neutron agent internal ports remain untagged for s...” : Bugs : neutron","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugs.launchpad.net/neutron/+bug/1734320","name":"https://bugs.launchpad.net/neutron/+bug/1734320","refsource":"CONFIRM","tags":["Issue Tracking","Third Party Advisory"],"title":"Bug #1734320 “Eavesdropping private traffic” : Bugs : neutron","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14636","name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14636","refsource":"CONFIRM","tags":["Issue Tracking","Third Party Advisory"],"title":"1594977 – (CVE-2018-14636) CVE-2018-14636 openstack-neutron: eavesdropping private traffic due to trunk ports after live migration","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-14636","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14636","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"14636","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openstack","cpe5":"neutron","cpe6":"13.0.0","cpe7":"b1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"14636","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openstack","cpe5":"neutron","cpe6":"13.0.0","cpe7":"b1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"14636","vulnerable":"1","versionEndIncluding":"11.0.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openstack","cpe5":"neutron","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"14636","vulnerable":"1","versionEndIncluding":"12.0.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openstack","cpe5":"neutron","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2018-14636","qid":"998088","title":"Python (Pip) Security Update for neutron (GHSA-8q95-jj7p-x93x)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"secalert@redhat.com","ID":"CVE-2018-14636","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"openstack-neutron","version":{"version_data":[{"version_value":"13.0.0.0b2"},{"version_value":"12.0.3"},{"version_value":"11.0.5"}]}}]},"vendor_name":"The Openstack Project"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Live-migrated instances are briefly able to inspect traffic for other instances on the same hypervisor. This brief window could be extended indefinitely if the instance's port is set administratively down prior to live-migration and kept down after the migration is complete. This is possible due to the Open vSwitch integration bridge being connected to the instance during migration. When connected to the integration bridge, all traffic for instances using the same Open vSwitch instance would potentially be visible to the migrated guest, as the required Open vSwitch VLAN filters are only applied post-migration. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3, 11.0.5 are vulnerable."}]},"impact":{"cvss":[[{"vectorString":"5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.0"}]]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-300"}]}]},"references":{"reference_data":[{"name":"https://bugs.launchpad.net/neutron/+bug/1767422","refsource":"CONFIRM","url":"https://bugs.launchpad.net/neutron/+bug/1767422"},{"name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14636","refsource":"CONFIRM","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14636"},{"name":"https://bugs.launchpad.net/neutron/+bug/1734320","refsource":"CONFIRM","url":"https://bugs.launchpad.net/neutron/+bug/1734320"}]}},"nvd":{"publishedDate":"2018-09-10 19:29:00","lastModifiedDate":"2019-10-09 23:35:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.6,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":3.5},"severity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0.0","versionEndIncluding":"12.0.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openstack:neutron:13.0.0:b1:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0.0","versionEndIncluding":"11.0.4","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"14636","Ordinal":"131344","Title":"CVE-2018-14636","CVE":"CVE-2018-14636","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"14636","Ordinal":"1","NoteData":"Live-migrated instances are briefly able to inspect traffic for other instances on the same hypervisor. This brief window could be extended indefinitely if the instance's port is set administratively down prior to live-migration and kept down after the migration is complete. This is possible due to the Open vSwitch integration bridge being connected to the instance during migration. When connected to the integration bridge, all traffic for instances using the same Open vSwitch instance would potentially be visible to the migrated guest, as the required Open vSwitch VLAN filters are only applied post-migration. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3, 11.0.5 are vulnerable.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"14636","Ordinal":"2","NoteData":"2018-09-10","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"14636","Ordinal":"3","NoteData":"2018-09-10","Type":"Other","Title":"Modified"}]}}}