<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Open Virtual Network — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/open-virtual-network/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 24 Apr 2026 13:16:21 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/open-virtual-network/feed.xml" rel="self" type="application/rss+xml"/><item><title>OVN DHCPv6 Out-of-Bounds Read Vulnerability (CVE-2026-5367)</title><link>https://feed.craftedsignal.io/briefs/2026-04-ovn-dhcpv6-oob-read/</link><pubDate>Fri, 24 Apr 2026 13:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ovn-dhcpv6-oob-read/</guid><description>A remote attacker can exploit an out-of-bounds read vulnerability in Open Virtual Network (OVN) by sending crafted DHCPv6 SOLICIT packets, leading to sensitive information disclosure.</description><content:encoded><![CDATA[<p>CVE-2026-5367 describes a critical vulnerability affecting Open Virtual Network (OVN). A remote attacker can exploit this flaw by sending specially crafted DHCPv6 SOLICIT packets to the OVN controller. These packets contain an inflated Client ID length, which causes the <code>ovn-controller</code> process to read beyond the allocated memory buffer. This out-of-bounds read allows the attacker to potentially access sensitive information stored in the heap memory, which can then be disclosed back to the attacker&rsquo;s virtual machine port. Successful exploitation grants unauthorized access to potentially sensitive data within the OVN environment, impacting confidentiality.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable OVN deployment.</li>
<li>Attacker crafts a malicious DHCPv6 SOLICIT packet. The packet includes an inflated Client ID length field.</li>
<li>The attacker sends the crafted DHCPv6 SOLICIT packet to the OVN controller.</li>
<li>The <code>ovn-controller</code> receives the packet and attempts to process the DHCPv6 Client ID option.</li>
<li>Due to the inflated Client ID length, the <code>ovn-controller</code> reads beyond the bounds of the allocated memory buffer.</li>
<li>This out-of-bounds read accesses sensitive information residing in the heap memory.</li>
<li>The compromised data is included in the DHCPv6 response sent back to the attacker&rsquo;s virtual machine port.</li>
<li>Attacker receives the DHCPv6 response containing the disclosed sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5367 leads to the disclosure of sensitive information stored in the heap memory of the <code>ovn-controller</code>. The attacker can potentially gain access to configuration data, cryptographic keys, or other sensitive data, allowing them to further compromise the OVN environment or gain unauthorized access to other resources within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for suspicious DHCPv6 SOLICIT packets with unusually long Client ID lengths targeting the OVN controller, utilizing the network_connection rule provided below.</li>
<li>Analyze DHCPv6 server logs for errors related to invalid Client ID lengths or out-of-bounds memory access, leveraging the linux process_creation rule provided below if auditd captures such events.</li>
<li>Apply any available patches or updates provided by the OVN project to address CVE-2026-5367.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>vulnerability</category><category>network</category></item></channel></rss>