Skip to main content

Advertisement

Table 1 Summary of the discovered vulnerability cases

From: Vulnerabilities and solutions for isolation in FlowVisor-based virtual network environments

Vulnerability cases
Problem Hypothesis Malicious action Consequence
VLAN ID access Controller x with no access to VLAN tagged packets Controller x able to control packets with any VLAN ID tag Theft, injection, or deviation of packets
Field rewrite Controller x with access only to specific values of the y header field Controller x can change the y header field of its packets to any other value Packet injection
Wildcard rewrite Controller x with access only to specific values of the y header field Controller x able to control packets with any value of y Theft, injection, or deviation of packets