High severity7.5NVD Advisory· Published Apr 4, 2017· Updated May 13, 2026
CVE-2015-1611
CVE-2015-1611
Description
OpenFlow plugin for OpenDaylight before Helium SR3 allows remote attackers to spoof the SDN topology and affect the flow of data, related to "fake LLDP injection."
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.opendaylight.openflowplugin:openflowpluginMaven | < 0.0.6-Helium-SR3 | 0.0.6-Helium-SR3 |
Affected products
1- cpe:2.3:a:opendaylight:openflow:-:*:*:*:*:opendaylight:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- wiki.opendaylight.org/view/Security_AdvisoriesnvdPatchThird Party Advisory
- www.securityfocus.com/bid/73254nvdThird Party AdvisoryVDB Entry
- cloudrouter.org/security/nvdThird Party Advisory
- github.com/advisories/GHSA-49wf-927p-jpvjghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2015-1611ghsaADVISORY
- www.internetsociety.org/sites/default/files/10_4_2.pdfnvdTechnical Description
- web.archive.org/web/20150510044305/https://wiki.opendaylight.org/view/Security_AdvisoriesghsaWEB
- web.archive.org/web/20150701104709/https://www.internetsociety.org/sites/default/files/10_4_2.pdfghsaWEB
News mentions
0No linked articles in our index yet.