CVE-2022-35503

7.5 HIGH

📋 TL;DR

CVE-2022-35503 is an improper input validation vulnerability in Open Source MANO (OSM) that allows authenticated attackers to execute arbitrary code within the Lifecycle Management (LCM) module container via malicious VNF descriptors. This affects OSM deployments versions 7 through 12 where attackers could compromise OSM components, steal sensitive data, or pivot to other telecom infrastructure. Organizations using vulnerable OSM versions for network function virtualization orchestration are at risk.

💻 Affected Systems

Products:
  • Open Source MANO (OSM)
Versions: v7 through v12
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments using the vulnerable versions regardless of configuration. Requires authenticated access to the OSM system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of OSM deployment leading to unauthorized access to telecom operator infrastructure, data exfiltration, service disruption, and lateral movement to other critical systems.

🟠

Likely Case

Compromise of the LCM module container allowing execution of arbitrary commands, potential data theft from OSM components, and manipulation of VNF deployments.

🟢

If Mitigated

Limited impact due to network segmentation, container isolation, and proper authentication controls preventing exploitation even if vulnerable.

🌐 Internet-Facing: MEDIUM - While authentication is required, internet-facing OSM instances could be targeted by attackers who obtain or guess credentials.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this to gain elevated privileges and potentially pivot to other systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and knowledge of VNF descriptor manipulation. The vulnerability is in the input validation of VNF descriptors that get processed by the LCM module.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: OSM Release THIRTEEN and later

Vendor Advisory: https://osm.etsi.org/news-events/blog/83-cve-2022-35503-disclosure

Restart Required: Yes

Instructions:

1. Backup current OSM deployment and configuration. 2. Upgrade to OSM Release THIRTEEN or later following official upgrade procedures. 3. Restart OSM services to apply the fix. 4. Verify the upgrade was successful and functionality is maintained.

🔧 Temporary Workarounds

Restrict VNF descriptor uploads

linux

Implement strict validation and sanitization of VNF descriptors before they reach the LCM module

# Implement custom validation scripts for VNF descriptors
# Configure OSM to reject malformed descriptors

Enhance authentication controls

all

Implement multi-factor authentication and strict access controls for OSM administrative interfaces

# Configure OSM with MFA if supported
# Implement IP whitelisting for administrative access

🧯 If You Can't Patch

  • Implement network segmentation to isolate OSM deployment from other critical infrastructure
  • Enhance monitoring and logging of LCM module activities and VNF descriptor processing

🔍 How to Verify

Check if Vulnerable:

Check OSM version using 'osm version' command and verify if it's between v7 and v12 inclusive

Check Version:

osm version

Verify Fix Applied:

After upgrade, verify version is THIRTEEN or later using 'osm version' and test VNF descriptor processing functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual VNF descriptor upload patterns
  • Unexpected process execution within LCM container
  • Authentication attempts followed by descriptor manipulation

Network Indicators:

  • Unusual outbound connections from OSM LCM module
  • Traffic patterns indicating data exfiltration

SIEM Query:

source="osm-logs" AND ("VNF descriptor" AND "malformed" OR "unexpected") OR (process="LCM" AND command="exec")

🔗 References

📤 Share & Export