CVE-2024-48809

7.5 HIGH

📋 TL;DR

A remote attacker can cause denial of service in Open Networking Foundation's sdran-in-a-box and onos-a1t components by exploiting the DeleteWatcher function. This affects organizations using sdran-in-a-box v1.4.3 or onos-a1t v0.2.3 for software-defined radio access network management.

💻 Affected Systems

Products:
  • sdran-in-a-box
  • onos-a1t
Versions: sdran-in-a-box v1.4.3, onos-a1t v0.2.3
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is in the onos-a1t component which is part of sdran-in-a-box deployments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of the sdran-in-a-box management system, potentially affecting radio access network operations and connectivity.

🟠

Likely Case

Degraded performance or temporary unavailability of the onos-a1t component, impacting network management capabilities.

🟢

If Mitigated

Minimal impact with proper network segmentation and access controls limiting exposure to the vulnerable component.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows remote exploitation without authentication, making it relatively easy to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check GitHub issues for updated versions

Vendor Advisory: https://github.com/onosproject/sdran-in-a-box/issues/206

Restart Required: Yes

Instructions:

1. Monitor the GitHub repository for patches. 2. Update to the latest version when available. 3. Restart the affected services.

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict network access to the onos-a1t component using firewall rules.

iptables -A INPUT -p tcp --dport <onos-a1t-port> -s <trusted-networks> -j ACCEPT
iptables -A INPUT -p tcp --dport <onos-a1t-port> -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to the vulnerable component.
  • Monitor system logs for unusual DeleteWatcher function calls or denial of service patterns.

🔍 How to Verify

Check if Vulnerable:

Check if running sdran-in-a-box v1.4.3 or onos-a1t v0.2.3 using version commands or configuration files.

Check Version:

Check deployment manifests or run 'docker ps' to inspect container versions if using containers.

Verify Fix Applied:

Verify the component has been updated to a version that addresses the vulnerability mentioned in the GitHub issue.

📡 Detection & Monitoring

Log Indicators:

  • Unusual DeleteWatcher function calls
  • Increased error rates or service restarts in onos-a1t logs

Network Indicators:

  • Unusual traffic patterns to onos-a1t ports
  • Multiple connection attempts to DeleteWatcher endpoints

SIEM Query:

source="onos-a1t" AND (event="DeleteWatcher" OR error="denial")

🔗 References

📤 Share & Export