CVE-2024-34036

4.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers to disrupt the initial connection between a gNB (gNodeB) and the Near Real-Time RAN Intelligent Controller (Near RT-RIC) by flooding the system with excessive subscription requests via an xApp. It affects O-RAN Near Realtime RIC I-Release deployments where xApps can send subscription requests. The attack can cause denial of service during critical connection establishment phases.

💻 Affected Systems

Products:
  • O-RAN Near Realtime RIC (Near RT-RIC)
Versions: I-Release versions before the fix
Operating Systems: Linux-based deployments (typical for O-RAN infrastructure)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments where xApps can send subscription requests to the Near RT-RIC. Requires xApp access to the subscription interface.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of gNB-Near RT-RIC connections, preventing new 5G radio units from joining the network and causing service outages for affected cells.

🟠

Likely Case

Temporary connection failures and increased latency during gNB registration, potentially causing intermittent service degradation.

🟢

If Mitigated

Minimal impact with proper rate limiting and request validation in place, possibly causing only minor delays during peak attack periods.

🌐 Internet-Facing: MEDIUM - While the Near RT-RIC typically resides in operator networks, xApps could potentially be exposed through management interfaces or compromised xApp deployments.
🏢 Internal Only: HIGH - Within operator networks, malicious or compromised xApps could easily exploit this vulnerability to disrupt critical RAN functions.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Simple flooding attack requiring only ability to send subscription requests via xApp interface.

Exploitation requires access to xApp functionality or ability to deploy/modify xApps. The attack pattern is straightforward resource exhaustion.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in O-RAN Near RT-RIC I-Release updates addressing RIC-1057

Vendor Advisory: https://jira.o-ran-sc.org/browse/RIC-1057

Restart Required: Yes

Instructions:

1. Update to the latest O-RAN Near RT-RIC I-Release version. 2. Apply patches addressing subscription request handling. 3. Restart Near RT-RIC services. 4. Verify xApp subscription interfaces are properly secured.

🔧 Temporary Workarounds

Rate Limit Subscription Requests

linux

Implement rate limiting on xApp subscription interfaces to prevent flooding attacks

# Configure rate limiting in Near RT-RIC configuration
# Example: Set max_subscription_requests_per_second=100 in ric-config.yaml

Restrict xApp Access

linux

Limit which xApps can send subscription requests and implement authentication/authorization

# Configure xApp authentication in security policies
# Example: Update xapp-policy.json with required permissions

🧯 If You Can't Patch

  • Implement network-level rate limiting and DDoS protection for Near RT-RIC interfaces
  • Monitor subscription request patterns and alert on abnormal volumes from xApps

🔍 How to Verify

Check if Vulnerable:

Check if your Near RT-RIC version is pre-fix I-Release and review xApp subscription interface configurations for rate limiting.

Check Version:

ricctl version or check Near RT-RIC deployment manifests for version information

Verify Fix Applied:

Test by sending high volumes of subscription requests via xApp interface and verify system remains responsive.

📡 Detection & Monitoring

Log Indicators:

  • High frequency of subscription requests from single xApp
  • Connection failures during gNB registration
  • Resource exhaustion warnings in Near RT-RIC logs

Network Indicators:

  • Unusual spike in traffic to Near RT-RIC subscription endpoints
  • Abnormal request patterns from xApp network segments

SIEM Query:

source="near-rt-ric" AND ("subscription request" OR "connection failed") AND count > threshold

🔗 References

📤 Share & Export