
Cloud Vulnerability DB
A community-led vulnerabilities database
An integer underflow vulnerability (CVE-2022-4338) was discovered in Organization Specific TLV processing within various versions of OpenvSwitch. The vulnerability was found in December 2022 and affects OpenvSwitch versions from 2.4.0 onwards when LLDP processing is enabled for a specific port (CVE Details, OpenWall).
The vulnerability exists in the LLDP implementation of Open vSwitch, specifically in the parsing of Auto Attach TLVs. The issue occurs due to improper length checks for the LLDPTLVAAISIDVLANASGNSSUBTYPE elements, which can lead to an integer underflow condition. The vulnerability was introduced in version 2.4.0 through commit be53a5c447c3 and has a CVSS v3.1 base score of 9.8 (Critical) (Ubuntu Security, GitHub PR).
If successfully exploited, this vulnerability could result in denial of service conditions and potentially lead to undefined behavior, including system crashes. The impact is particularly significant when LLDP processing is enabled on network interfaces (OpenWall).
The vulnerability was fixed in multiple versions including 3.0.3, 2.17.5, 2.16.6, 2.15.7, 2.14.8, and 2.13.10. The fix involves introducing proper bounds checking for the affected elements. While preventing LLDP packets from reaching Open vSwitch can mitigate the vulnerability, this is not recommended as it may disrupt network functionality. The permanent solution is to upgrade to a patched version (OpenWall, GitHub PR).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."