Published Fri, Jun 25th, 2021
Platforms
Under certain conditions, an attacker can flood DHCP packets to the victim VM, allowing it to impersonate the Metadata server, and grant themselves SSH access.
N/A
None required
No tracked CVEs
Contributed by https://github.com/0xdabbad00
Entry Status
Finalized
Disclosure Date
Sat, Sep 26th, 2020
Exploitability Period
-
Known ITW Exploitation
-
Detection Methods
None
Piercing Index Rating
-
Discovered by
Imre Rad