CVE-2024-51406

6.2 MEDIUM

📋 TL;DR

CVE-2024-51406 is an authentication bypass vulnerability in Floodlight SDN OpenFlow Controller v1.2 where local hosts can craft fake LLDP packets to manipulate network topology discovery. This allows attackers to hide specific clusters from the controller, causing missed hosts both inside and outside those clusters. Organizations using Floodlight v1.2 for software-defined networking are affected.

💻 Affected Systems

Products:
  • Floodlight SDN OpenFlow Controller
Versions: v1.2
Operating Systems: Linux, Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments where Floodlight is managing network topology via LLDP discovery. Requires local network access to the controller's management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could create persistent blind spots in network visibility, enabling undetected lateral movement, data exfiltration, or man-in-the-middle attacks across the SDN infrastructure.

🟠

Likely Case

Network topology manipulation leading to incorrect traffic routing, service disruption, and potential bypass of network segmentation controls.

🟢

If Mitigated

Limited to isolated network segments with proper access controls, reducing the attack surface and preventing exploitation from unauthorized hosts.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local network access and knowledge of LLDP packet crafting. The vulnerability is documented in academic research and GitHub issues.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://github.com/floodlight/floodlight/issues/870

Restart Required: No

Instructions:

1. Monitor the Floodlight GitHub repository for security updates. 2. Consider upgrading to a newer version if available. 3. Apply workarounds until an official patch is released.

🔧 Temporary Workarounds

Restrict LLDP Packet Sources

linux

Configure network switches to only accept LLDP packets from authorized sources and block crafted packets from untrusted hosts.

# Example on Linux with iptables: iptables -A INPUT -p LLDP -s ! <trusted_hosts> -j DROP

Implement Network Segmentation

all

Isolate Floodlight controller management interface from general network traffic using VLANs or firewalls.

# Configure switch VLANs to separate management traffic

🧯 If You Can't Patch

  • Implement strict network access controls to limit which hosts can communicate with the Floodlight controller's management interface.
  • Deploy network monitoring and intrusion detection systems to detect anomalous LLDP traffic patterns.

🔍 How to Verify

Check if Vulnerable:

Check Floodlight version: if running v1.2 and using LLDP for topology discovery, the system is vulnerable.

Check Version:

java -jar floodlight.jar --version

Verify Fix Applied:

Verify that LLDP packets from unauthorized sources are blocked and that network topology is correctly discovered.

📡 Detection & Monitoring

Log Indicators:

  • Unusual LLDP packet sources in Floodlight logs
  • Missing or inconsistent network topology entries

Network Indicators:

  • LLDP packets from unexpected MAC addresses
  • Abnormal LLDP traffic patterns

SIEM Query:

source="floodlight.log" AND ("LLDP" OR "topology") AND ("unexpected" OR "missing")

🔗 References

📤 Share & Export