CVE-2021-38598
Python vulnerability analysis and mitigation

Overview

OpenStack Neutron versions before 16.4.1, 17.x before 17.1.3, and 18.0.0 contain a hardware address impersonation vulnerability (CVE-2021-38598) when using the linuxbridge driver with ebtables-nft on Netfilter-based platforms. The vulnerability was discovered by Jake Yip from ARDC and Justin Mammarella from the University of Melbourne and was disclosed on August 23, 2021 (NVD, Ubuntu).

Technical details

The vulnerability occurs due to incompatibility issues between the linuxbridge driver and ebtables-nft implementation. When a new chain is created, the FLUSH command reverts the default policy back to RETURN instead of maintaining the intended DROP policy, which breaks the ARP spoofing protection mechanism. This affects systems using ebtables-nft, such as Ubuntu Focal and CentOS Stream. The vulnerability has been assigned a CVSS v3.1 base score of 9.1 (Critical) with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H (NVD).

Impact

By sending carefully crafted packets, an attacker with control of a server instance connected to the virtual switch can impersonate the hardware addresses of other systems on the network. This can result in denial of service conditions or potentially allow the interception of traffic intended for other destinations (NVD, Launchpad Bug).

Mitigation and workarounds

The vulnerability has been fixed in OpenStack Neutron versions 16.4.1, 17.1.3, and newer releases. The fix involves modifying the ARP protection commands to be compatible with ebtables-nft by ensuring proper chain creation with default DROP rules and correct rule prioritization (Launchpad Bug).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67511CRITICAL9.6
  • PythonPython
  • cai-framework
NoNoDec 11, 2025
CVE-2025-13780CRITICAL9.1
  • PythonPython
  • cpe:2.3:a:pgadmin:pgadmin
NoYesDec 11, 2025
CVE-2025-67644HIGH7.3
  • PythonPython
  • langgraph-checkpoint-sqlite
NoYesDec 11, 2025
CVE-2025-67720MEDIUM6.5
  • PythonPython
  • pyrofork
NoYesDec 11, 2025
CVE-2025-67485MEDIUM5.3
  • PythonPython
  • mad-proxy
NoNoDec 10, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management