CVE-2024-48809
📋 TL;DR
A remote attacker can cause denial of service in Open Networking Foundation's sdran-in-a-box and onos-a1t components by exploiting the DeleteWatcher function. This affects organizations using sdran-in-a-box v1.4.3 or onos-a1t v0.2.3 for software-defined radio access network management.
💻 Affected Systems
- sdran-in-a-box
- onos-a1t
📦 What is this software?
Onos A1t by Opennetworking
Sdran In A Box by Opennetworking
⚠️ Risk & Real-World Impact
Worst Case
Complete service disruption of the sdran-in-a-box management system, potentially affecting radio access network operations and connectivity.
Likely Case
Degraded performance or temporary unavailability of the onos-a1t component, impacting network management capabilities.
If Mitigated
Minimal impact with proper network segmentation and access controls limiting exposure to the vulnerable component.
🎯 Exploit Status
The vulnerability allows remote exploitation without authentication, making it relatively easy to exploit.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check GitHub issues for updated versions
Vendor Advisory: https://github.com/onosproject/sdran-in-a-box/issues/206
Restart Required: Yes
Instructions:
1. Monitor the GitHub repository for patches. 2. Update to the latest version when available. 3. Restart the affected services.
🔧 Temporary Workarounds
Network Segmentation
linuxRestrict network access to the onos-a1t component using firewall rules.
iptables -A INPUT -p tcp --dport <onos-a1t-port> -s <trusted-networks> -j ACCEPT
iptables -A INPUT -p tcp --dport <onos-a1t-port> -j DROP
🧯 If You Can't Patch
- Implement strict network access controls to limit exposure to the vulnerable component.
- Monitor system logs for unusual DeleteWatcher function calls or denial of service patterns.
🔍 How to Verify
Check if Vulnerable:
Check if running sdran-in-a-box v1.4.3 or onos-a1t v0.2.3 using version commands or configuration files.
Check Version:
Check deployment manifests or run 'docker ps' to inspect container versions if using containers.
Verify Fix Applied:
Verify the component has been updated to a version that addresses the vulnerability mentioned in the GitHub issue.
📡 Detection & Monitoring
Log Indicators:
- Unusual DeleteWatcher function calls
- Increased error rates or service restarts in onos-a1t logs
Network Indicators:
- Unusual traffic patterns to onos-a1t ports
- Multiple connection attempts to DeleteWatcher endpoints
SIEM Query:
source="onos-a1t" AND (event="DeleteWatcher" OR error="denial")