opendaylight CVE Vulnerabilities & Metrics

Focus on opendaylight vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About opendaylight Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with opendaylight. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total opendaylight CVEs: 13
Earliest CVE date: 26 Aug 2014, 14:55 UTC
Latest CVE date: 16 Mar 2018, 20:29 UTC

Latest CVE reference: CVE-2018-1078

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical opendaylight CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.52

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 0
4.0-6.9 12
7.0-8.9 2
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS opendaylight CVEs

These are the five CVEs with the highest CVSS scores for opendaylight, sorted by severity first and recency.

All CVEs for opendaylight

CVE-2018-1078 opendaylight vulnerability CVSS: 7.5 16 Mar 2018, 20:29 UTC

OpenDayLight version Carbon SR3 and earlier contain a vulnerability during node reconciliation that can result in traffic flows that should be expired or should expire shortly being re-installed and their timers reset resulting in traffic being allowed that should be expired.

CVE-2017-1000411 opendaylight vulnerability CVSS: 5.0 31 Jan 2018, 14:29 UTC

OpenFlow Plugin and OpenDayLight Controller versions Nitrogen, Carbon, Boron, Robert Varga, Anil Vishnoi contain a flaw when multiple 'expired' flows take up the memory resource of CONFIG DATASTORE which leads to CONTROLLER shutdown. If multiple different flows with 'idle-timeout' and 'hard-timeout' are sent to the Openflow Plugin REST API, the expired flows will eventually crash the controller once its resource allocations set with the JVM size are exceeded. Although the installed flows (with timeout set) are removed from network (and thus also from controller's operations DS), the expired entries are still present in CONFIG DS. The attack can originate both from NORTH or SOUTH. The above description is for a north bound attack. A south bound attack can originate when an attacker attempts a flow flooding attack and since flows come with timeouts, the attack is not successful. However, the attacker will now be successful in CONTROLLER overflow attack (resource consumption). Although, the network (actual flow tables) and operational DS are only (~)1% occupied, the controller requests for resource consumption. This happens because the installed flows get removed from the network upon timeout.

CVE-2017-1000406 opendaylight vulnerability CVSS: 5.0 30 Nov 2017, 21:29 UTC

OpenDaylight Karaf 0.6.1-Carbon fails to clear the cache after a password change, allowing the old password to be used until the Karaf cache is manually cleared (e.g. via restart).

CVE-2015-1778 opendaylight vulnerability CVSS: 7.5 27 Jun 2017, 20:29 UTC

The custom authentication realm used by karaf-tomcat's "opendaylight" realm in Opendaylight before Helium SR3 will authenticate any username and password combination.

CVE-2014-8149 opendaylight vulnerability CVSS: 6.5 27 Jun 2017, 20:29 UTC

OpenDaylight defense4all 1.1.0 and earlier allows remote authenticated users to write report data to arbitrary files.

CVE-2017-1000361 opendaylight vulnerability CVSS: 5.0 24 Apr 2017, 16:59 UTC

DOMRpcImplementationNotAvailableException when sending Port-Status packets to OpenDaylight. Controller launches exceptions and consumes more CPU resources. Component: OpenDaylight is vulnerable to this flaw. Version: The tested versions are OpenDaylight 3.3 and 4.0.

CVE-2017-1000360 opendaylight vulnerability CVSS: 5.0 24 Apr 2017, 16:59 UTC

StreamCorruptedException and NullPointerException in OpenDaylight odl-mdsal-xsql. Controller launches exceptions in the console. Component: OpenDaylight odl-mdsal-xsql is vulnerable to this flaw. Version: The tested versions are OpenDaylight 3.3 and 4.0.

CVE-2017-1000359 opendaylight vulnerability CVSS: 5.0 24 Apr 2017, 16:59 UTC

Java out of memory error and significant increase in resource consumption. Component: OpenDaylight odl-mdsal-xsql is vulnerable to this flaw. Version: The tested versions are OpenDaylight 3.3 and 4.0.

CVE-2017-1000358 opendaylight vulnerability CVSS: 4.0 24 Apr 2017, 16:59 UTC

Controller throws an exception and does not allow user to add subsequent flow for a particular switch. Component: OpenDaylight odl-restconf feature contains this flaw. Version: OpenDaylight 4.0 is affected by this flaw.

CVE-2017-1000357 opendaylight vulnerability CVSS: 5.0 24 Apr 2017, 16:59 UTC

Denial of Service attack when the switch rejects to receive packets from the controller. Component: This vulnerability affects OpenDaylight odl-l2switch-switch, which is the feature responsible for the OpenFlow communication. Version: OpenDaylight versions 3.3 (Lithium-SR3), 3.4 (Lithium-SR4), 4.0 (Beryllium), 4.1 (Beryllium-SR1), 4.2 (Beryllium-SR2), and 4.4 (Beryllium-SR4) are affected by this flaw. Java version is openjdk version 1.8.0_91.

CVE-2015-1612 opendaylight vulnerability CVSS: 5.0 04 Apr 2017, 17:59 UTC

OpenFlow plugin for OpenDaylight before Helium SR3 allows remote attackers to spoof the SDN topology and affect the flow of data, related to the reuse of LLDP packets, aka "LLDP Relay."

CVE-2015-1611 opendaylight vulnerability CVSS: 5.0 04 Apr 2017, 17:59 UTC

OpenFlow plugin for OpenDaylight before Helium SR3 allows remote attackers to spoof the SDN topology and affect the flow of data, related to "fake LLDP injection."

CVE-2015-1610 opendaylight vulnerability CVSS: 5.0 20 Mar 2017, 16:59 UTC

hosttracker in OpenDaylight l2switch allows remote attackers to change the host location information by spoofing the MAC address, aka "topology spoofing."

CVE-2014-5035 opendaylight vulnerability CVSS: 6.8 26 Aug 2014, 14:55 UTC

The Netconf (TCP) service in OpenDaylight 1.0 allows remote attackers to read arbitrary files via an XML external entity declaration in conjunction with an entity reference in an XML-RPC message, related to an XML External Entity (XXE) issue.