CVE-2022-3277
Python vulnerability analysis and mitigation

Overview

CVE-2022-3277 is an uncontrolled resource consumption vulnerability discovered in OpenStack Neutron that was disclosed on March 6, 2023. The vulnerability affects the security group functionality in OpenStack Neutron, allowing remote authenticated users to query and create security groups for invalid projects. This flaw impacts multiple versions of OpenStack Neutron, including those used in Red Hat OpenStack Platform and Ubuntu distributions (Ubuntu Security, Red Hat Security).

Technical details

The vulnerability stems from a design flaw where a GET request to list security groups (/networking/v2.0/security-groups?project_id=None) inadvertently creates a default security group for the specified project, even if invalid. Each created security group includes four default rules (allow outgoing and remote=self for both IPv4 and IPv6). The vulnerability has been assigned a CVSS v3.1 base score of 6.5 (Medium), with attack vector being Network, attack complexity Low, and privileges required Low (Ubuntu Security).

Impact

The vulnerability allows authenticated users to create an unlimited number of security groups that are not constrained by the user's quota. This can lead to resource consumption and potential denial of service by consuming API and database resources. The impact is amplified because each security group created includes four default rules, increasing the resource usage (Launchpad Bug).

Mitigation and workarounds

The vulnerability has been fixed across multiple versions of OpenStack Neutron. Patches have been released for various distributions including Ubuntu (versions 22.04 LTS, 20.04 LTS, 18.04 LTS) and Red Hat OpenStack Platform. The fix prevents non-privileged users from creating default security groups for projects they don't have access to (Ubuntu Security, Red Hat Errata).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66423HIGH7.1
  • PythonPython
  • tryton-server
NoYesNov 30, 2025
CVE-2025-66454MEDIUM6.5
  • PythonPython
  • arcade-mcp-server
NoYesDec 02, 2025
CVE-2025-66424MEDIUM6.5
  • PythonPython
  • trytond
NoYesNov 30, 2025
CVE-2025-66422MEDIUM4.3
  • PythonPython
  • tryton-server
NoYesNov 30, 2025
CVE-2025-65858LOW3.5
  • PythonPython
  • calibreweb
NoNoDec 02, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management