openvswitch CVE Vulnerabilities & Metrics

Focus on openvswitch vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About openvswitch Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with openvswitch. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total openvswitch CVEs: 20
Earliest CVE date: 07 Aug 2012, 20:55 UTC
Latest CVE date: 19 Jan 2024, 15:15 UTC

Latest CVE reference: CVE-2024-22563

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical openvswitch CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.77

Max CVSS: 7.8

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 9
4.0-6.9 6
7.0-8.9 6
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS openvswitch CVEs

These are the five CVEs with the highest CVSS scores for openvswitch, sorted by severity first and recency.

All CVEs for openvswitch

CVE-2024-22563 openvswitch vulnerability CVSS: 0 19 Jan 2024, 15:15 UTC

openvswitch 2.17.8 was discovered to contain a memory leak via the function xmalloc__ in openvswitch-2.17.8/lib/util.c.

CVE-2023-5366 openvswitch vulnerability CVSS: 0 06 Oct 2023, 18:15 UTC

A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.

CVE-2022-4338 openvswitch vulnerability CVSS: 0 10 Jan 2023, 22:15 UTC

An integer underflow in Organization Specific TLV was found in various versions of OpenvSwitch.

CVE-2022-4337 openvswitch vulnerability CVSS: 0 10 Jan 2023, 22:15 UTC

An out-of-bounds read in Organization Specific TLV was found in various versions of OpenvSwitch.

CVE-2019-25076 openvswitch vulnerability CVSS: 0 08 Sep 2022, 23:15 UTC

The TSS (Tuple Space Search) algorithm in Open vSwitch 2.x through 2.17.2 and 3.0.0 allows remote attackers to cause a denial of service (delays of legitimate traffic) via crafted packet data that requires excessive evaluation time within the packet classification algorithm for the MegaFlow cache, aka a Tuple Space Explosion (TSE) attack.

CVE-2022-0669 openvswitch vulnerability CVSS: 0 29 Aug 2022, 15:15 UTC

A flaw was found in dpdk. This flaw allows a malicious vhost-user master to attach an unexpected number of fds as ancillary data to VHOST_USER_GET_INFLIGHT_FD / VHOST_USER_SET_INFLIGHT_FD messages that are not closed by the vhost-user slave. By sending such messages continuously, the vhost-user master exhausts available fd in the vhost-user slave process, leading to a denial of service.

CVE-2021-3905 openvswitch vulnerability CVSS: 0 23 Aug 2022, 16:15 UTC

A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.

CVE-2021-36980 openvswitch vulnerability CVSS: 4.3 20 Jul 2021, 07:15 UTC

Open vSwitch (aka openvswitch) 2.11.0 through 2.15.0 has a use-after-free in decode_NXAST_RAW_ENCAP (called from ofpact_decode and ofpacts_decode) during the decoding of a RAW_ENCAP action.

CVE-2020-27827 openvswitch vulnerability CVSS: 7.1 18 Mar 2021, 17:15 UTC

A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.

CVE-2020-35498 openvswitch vulnerability CVSS: 7.8 11 Feb 2021, 18:15 UTC

A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.

CVE-2018-17206 openvswitch vulnerability CVSS: 4.0 19 Sep 2018, 16:29 UTC

An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6. The decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding.

CVE-2018-17205 openvswitch vulnerability CVSS: 5.0 19 Sep 2018, 16:29 UTC

An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting ofproto_rule_insert__ in ofproto/ofproto.c. During bundle commit, flows that are added in a bundle are applied to ofproto in order. If a flow cannot be added (e.g., the flow action is a go-to for a group id that does not exist), OvS tries to revert back all previous flows that were successfully applied from the same bundle. This is possible since OvS maintains list of old flows that were replaced by flows from the bundle. While reinserting old flows, OvS has an assertion failure due to a check on rule state != RULE_INITIALIZED. This would work for new flows, but for an old flow the rule state is RULE_REMOVED. The assertion failure causes an OvS crash.

CVE-2018-17204 openvswitch vulnerability CVSS: 4.0 19 Sep 2018, 16:29 UTC

An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting parse_group_prop_ntr_selection_method in lib/ofp-util.c. When decoding a group mod, it validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when it might still be invalid. This causes an assertion failure (via OVS_NOT_REACHED). ovs-vswitchd does not enable support for OpenFlow 1.5 by default.

CVE-2017-14970 openvswitch vulnerability CVSS: 4.3 02 Oct 2017, 01:29 UTC

In lib/ofp-util.c in Open vSwitch (OvS) before 2.8.1, there are multiple memory leaks while parsing malformed OpenFlow group mod messages. NOTE: the vendor disputes the relevance of this report, stating "it can only be triggered by an OpenFlow controller, but OpenFlow controllers have much more direct and powerful ways to force Open vSwitch to allocate memory, such as by inserting flows into the flow table."

CVE-2017-9265 openvswitch vulnerability CVSS: 7.5 29 May 2017, 04:29 UTC

In Open vSwitch (OvS) v2.7.0, there is a buffer over-read while parsing the group mod OpenFlow message sent from the controller in `lib/ofp-util.c` in the function `ofputil_pull_ofp15_group_mod`.

CVE-2017-9264 openvswitch vulnerability CVSS: 7.5 29 May 2017, 04:29 UTC

In lib/conntrack.c in the firewall implementation in Open vSwitch (OvS) 2.6.1, there is a buffer over-read while parsing malformed TCP, UDP, and IPv6 packets in the functions `extract_l3_ipv6`, `extract_l4_tcp`, and `extract_l4_udp` that can be triggered remotely.

CVE-2017-9263 openvswitch vulnerability CVSS: 3.3 29 May 2017, 04:29 UTC

In Open vSwitch (OvS) 2.7.0, while parsing an OpenFlow role status message, there is a call to the abort() function for undefined role status reasons in the function `ofp_print_role_status_message` in `lib/ofp-print.c` that may be leveraged toward a remote DoS attack by a malicious switch.

CVE-2016-10377 openvswitch vulnerability CVSS: 5.8 29 May 2017, 04:29 UTC

In Open vSwitch (OvS) 2.5.0, a malformed IP packet can cause the switch to read past the end of the packet buffer due to an unsigned integer underflow in `lib/flow.c` in the function `miniflow_extract`, permitting remote bypass of the access control list enforced by the switch.

CVE-2017-9214 openvswitch vulnerability CVSS: 7.5 23 May 2017, 17:29 UTC

In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`.

CVE-2016-2074 openvswitch vulnerability CVSS: 7.5 03 Jul 2016, 21:59 UTC

Buffer overflow in lib/flow.c in ovs-vswitchd in Open vSwitch 2.2.x and 2.3.x before 2.3.3 and 2.4.x before 2.4.1 allows remote attackers to execute arbitrary code via crafted MPLS packets, as demonstrated by a long string in an ovs-appctl command.

CVE-2012-3449 openvswitch vulnerability CVSS: 3.6 07 Aug 2012, 20:55 UTC

Open vSwitch 1.4.2 uses world writable permissions for (1) /var/lib/openvswitch/pki/controllerca/incoming/ and (2) /var/lib/openvswitch/pki/switchca/incoming/, which allows local users to delete and overwrite arbitrary files.