CVE-2023-40998

7.5 HIGH

📋 TL;DR

A buffer overflow vulnerability in O-RAN Software Community's ric-plt-lib-rmr library version 4.9.0 allows remote attackers to cause denial of service by sending specially crafted packets that exceed expected size limits. This affects systems using the RIC (RAN Intelligent Controller) platform for Open RAN deployments. The vulnerability is in the packet size handling component of the RMR (RIC Message Router) library.

💻 Affected Systems

Products:
  • O-RAN Software Community ric-plt-lib-rmr
Versions: Version 4.9.0 specifically
Operating Systems: Linux-based systems running O-RAN RIC platform
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems using the RMR library for message routing in O-RAN RIC deployments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, though buffer overflow typically results in DoS in this context.

🟠

Likely Case

Denial of service causing RIC platform instability or crashes, disrupting Open RAN network operations.

🟢

If Mitigated

Limited impact with proper network segmentation and input validation controls in place.

🌐 Internet-Facing: MEDIUM - While potentially exploitable remotely, Open RAN components are typically deployed in controlled telecom environments.
🏢 Internal Only: HIGH - Within telecom networks, this could disrupt critical RAN operations if exploited.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Remote exploitation possible via network packets, but requires understanding of RMR protocol and packet structure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 4.9.1 or later

Vendor Advisory: https://jira.o-ran-sc.org/browse/RIC-989

Restart Required: Yes

Instructions:

1. Check current ric-plt-lib-rmr version. 2. Update to version 4.9.1 or later from O-RAN Software Community repositories. 3. Restart RIC services using the library.

🔧 Temporary Workarounds

Network Packet Filtering

linux

Implement network filtering to restrict packet sizes to expected ranges for RMR traffic

iptables -A INPUT -p tcp --dport [RMR_PORT] -m length --length [MAX_SIZE] -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate RIC components from untrusted networks
  • Deploy intrusion detection/prevention systems to monitor for anomalous packet sizes in RMR traffic

🔍 How to Verify

Check if Vulnerable:

Check installed ric-plt-lib-rmr package version: dpkg -l | grep ric-plt-lib-rmr or rpm -qa | grep ric-plt-lib-rmr

Check Version:

dpkg -l | grep ric-plt-lib-rmr || rpm -qa | grep ric-plt-lib-rmr || find /usr -name '*rmr*' -type f -exec strings {} \; | grep -i version

Verify Fix Applied:

Verify version is 4.9.1 or later and test RMR functionality with normal traffic patterns

📡 Detection & Monitoring

Log Indicators:

  • Process crashes of RMR-related services
  • Memory allocation errors in system logs
  • Abnormal termination of ric-plt processes

Network Indicators:

  • Unusually large RMR protocol packets
  • Multiple connection attempts with varying packet sizes

SIEM Query:

source="*ric*" AND ("segmentation fault" OR "buffer overflow" OR "abort")

🔗 References

📤 Share & Export