Skip to main content

Table 1 Summary of the discovered vulnerability cases

From: Vulnerabilities and solutions for isolation in FlowVisor-based virtual network environments

Vulnerability cases

Problem

Hypothesis

Malicious action

Consequence

VLAN ID access

Controller x with no access to VLAN tagged packets

Controller x able to control packets with any VLAN ID tag

Theft, injection, or deviation of packets

Field rewrite

Controller x with access only to specific values of the y header field

Controller x can change the y header field of its packets to any other value

Packet injection

Wildcard rewrite

Controller x with access only to specific values of the y header field

Controller x able to control packets with any value of y

Theft, injection, or deviation of packets