CVE-2024-53916

7.5 HIGH

📋 TL;DR

This vulnerability in OpenStack Neutron allows unprivileged tenants to modify network tags on network objects they don't own due to improper policy enforcement. It affects OpenStack deployments using vulnerable Neutron versions, potentially enabling unauthorized network configuration changes. The issue impacts Neutron versions 23.x before 23.2.1, 24.x before 24.0.2, and 25.x before 25.0.1.

💻 Affected Systems

Products:
  • OpenStack Neutron
Versions: 23.x before 23.2.1, 24.x before 24.0.2, 25.x before 25.0.1
Operating Systems: Linux distributions running OpenStack
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments where multiple tenants share the same Neutron instance and network tagging is enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could manipulate network tags to disrupt network segmentation, bypass security controls, or interfere with network-dependent services, potentially leading to data leakage or service disruption.

🟠

Likely Case

Tenants could modify network tags on other tenants' networks, causing configuration inconsistencies, potential network access issues, or minor service disruptions.

🟢

If Mitigated

With proper network segmentation and monitoring, impact would be limited to configuration anomalies that can be detected and corrected.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tenant-level access to the OpenStack environment. The vulnerability is in the API endpoint logic, making exploitation straightforward for authenticated users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 23.2.1, 24.0.2, or 25.0.1

Vendor Advisory: https://security.openstack.org/ossa/OSSA-2024-005.html

Restart Required: Yes

Instructions:

1. Identify current Neutron version. 2. Upgrade to patched version: 23.2.1, 24.0.2, or 25.0.1. 3. Restart Neutron services. 4. Verify the fix by testing network tag modifications.

🔧 Temporary Workarounds

Disable network tagging

linux

Temporarily disable network tagging functionality to prevent exploitation

# Edit neutron.conf and set:
# enable_network_tagging = false

Restrict API access

all

Use network policies or API gateways to restrict access to network tagging endpoints

# Configure API gateway rules or firewall rules to restrict access to /v2.0/networks/{network_id}/tags endpoints

🧯 If You Can't Patch

  • Implement strict network segmentation to limit cross-tenant network access
  • Enable detailed logging and monitoring for network tag modification events

🔍 How to Verify

Check if Vulnerable:

Check Neutron version with: neutron --version or pip show neutron. If version is 23.x < 23.2.1, 24.x < 24.0.2, or 25.x < 25.0.1, system is vulnerable.

Check Version:

neutron --version 2>/dev/null || pip show neutron | grep Version

Verify Fix Applied:

After patching, verify version is 23.2.1, 24.0.2, or 25.0.1. Test that tenants cannot modify tags on networks they don't own.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized network tag modifications in Neutron logs
  • API calls to /v2.0/networks/{network_id}/tags from non-owning tenants
  • Failed policy checks for network tag operations

Network Indicators:

  • Unusual API traffic patterns to network tagging endpoints
  • Cross-tenant network configuration changes

SIEM Query:

source="neutron.log" AND "tags" AND "network" AND ("add" OR "clear" OR "update") AND NOT "authorized"

🔗 References

📤 Share & Export