CVE-2023-5366
NixOS vulnerability analysis and mitigation

Overview

A vulnerability was discovered in Open vSwitch (CVE-2023-5366) that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. The vulnerability affects Open vSwitch versions 2.1 and newer, allowing local attackers to create specially crafted packets with modified or spoofed target IP address fields that can redirect ICMPv6 traffic to arbitrary IP addresses (OpenWall Advisory, NVD).

Technical details

The vulnerability stems from a discrepancy between the OpenFlow specification and datapath implementations. While the OpenFlow spec only requires ICMPV6 TYPE=135 or ICMPV6 TYPE=136 as prerequisites for IPV6_ND_TARGET, datapath implementations treat ICMPV6_CODE=0 as a requirement for packets with Target Address options. This mismatch leads to the creation of overly broad datapath flows that match packets regardless of the Target Address value. The vulnerability has a CVSS v3.1 base score of 5.5 (Medium) according to NVD, with vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N (OpenWall Advisory, NVD).

Impact

The vulnerability can allow attackers to bypass Neighbor Discovery anti-spoofing protection. When exploited, it enables the redirection of ICMPv6 traffic to arbitrary IP addresses, potentially compromising network security and enabling man-in-the-middle attacks between virtual machines (OpenWall Advisory).

Mitigation and workarounds

For affected versions of Open vSwitch, the primary mitigation is to add an icmpv6_code=0 match to OpenFlow rules. Fixed versions include Open vSwitch 3.2.2, 3.1.4, 3.0.6, and 2.17.9. The development team recommends following the mitigation strategy even with patches applied, as checking both ICMPv6 Code and Type is the correct way to validate Neighbor Discovery packets according to RFC 4861 (OpenWall Advisory).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22783HIGH8.1
  • NixOSNixOS
  • iris
NoYesJan 12, 2026
CVE-2026-0821MEDIUM6.9
  • NixOSNixOS
  • quickjs
NoNoJan 10, 2026
CVE-2025-68949MEDIUM5.3
  • NixOSNixOS
  • n8n
NoYesJan 13, 2026
CVE-2026-22784LOW2.3
  • NixOSNixOS
  • lychee
NoYesJan 12, 2026
CVE-2026-23497LOW1.3
  • NixOSNixOS
  • learning
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management