CVE-2024-34045

7.5 HIGH

📋 TL;DR

This vulnerability is a denial-of-service flaw in O-RAN E2T's SCTP thread implementation where a malformed E2setup message can cause a crash when incrementing Prometheus metrics. It affects O-RAN deployments using vulnerable E2T components, potentially disrupting radio access network operations.

💻 Affected Systems

Products:
  • O-RAN E2T (E2 Termination)
Versions: Specific versions not publicly documented in CVE; check O-RAN SC RIC-1047 for details
Operating Systems: Linux-based systems running O-RAN software
Default Config Vulnerable: ⚠️ Yes
Notes: Affects deployments using the vulnerable SCTP thread implementation in E2T components. Requires E2setup message processing capability.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of the E2T component, causing loss of connectivity between O-RAN components and potentially affecting cellular network availability in the affected area.

🟠

Likely Case

Service interruption of the E2T component requiring restart, causing temporary disruption to O-RAN operations until service is restored.

🟢

If Mitigated

Isolated component failure with minimal impact due to redundancy and proper monitoring/automated recovery mechanisms.

🌐 Internet-Facing: LOW - O-RAN components are typically deployed in protected operator networks, not directly internet-facing.
🏢 Internal Only: HIGH - Critical internal component that could disrupt O-RAN operations if exploited within the operator network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Requires sending malformed E2setup message to vulnerable endpoint

Exploitation requires network access to E2T SCTP interface. No authentication needed for the vulnerable function call.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check O-RAN SC RIC-1047 for specific fixed versions

Vendor Advisory: https://jira.o-ran-sc.org/browse/RIC-1047

Restart Required: Yes

Instructions:

1. Check O-RAN SC RIC-1047 for patch details. 2. Apply the provided fix to sctpThread.cpp. 3. Rebuild and redeploy E2T component. 4. Restart E2T service.

🔧 Temporary Workarounds

Network segmentation

linux

Restrict access to E2T SCTP interface to only trusted O-RAN components

iptables -A INPUT -p sctp --dport [E2T_PORT] -s [TRUSTED_SUBNET] -j ACCEPT
iptables -A INPUT -p sctp --dport [E2T_PORT] -j DROP

Monitoring and automated recovery

linux

Implement monitoring for E2T crashes with automated restart procedures

systemctl enable e2t-monitor.service
Create watchdog script to restart E2T if crashes detected

🧯 If You Can't Patch

  • Implement strict network access controls to limit which systems can communicate with E2T SCTP interface
  • Deploy redundant E2T instances with load balancing to maintain service if one instance crashes

🔍 How to Verify

Check if Vulnerable:

Check E2T version against patched versions in RIC-1047. Monitor for crashes in sctpThread.cpp when processing E2setup messages.

Check Version:

Check E2T component version through administrative interface or configuration files specific to O-RAN deployment

Verify Fix Applied:

Test with malformed E2setup messages to confirm E2T no longer crashes. Verify Prometheus metrics increment properly without issues.

📡 Detection & Monitoring

Log Indicators:

  • E2T process crashes
  • SCTP thread termination errors
  • Prometheus metric collection failures
  • Segmentation faults in sctpThread.cpp

Network Indicators:

  • Unusual SCTP traffic patterns to E2T port
  • Multiple E2setup messages from single source

SIEM Query:

source="e2t.logs" AND ("segmentation fault" OR "sctpThread" OR "E2setup" AND "crash")

🔗 References

📤 Share & Export