CVE-2025-24328

4.2 MEDIUM

📋 TL;DR

A stack overflow vulnerability in Nokia Single RAN baseband OAM service allows attackers to cause service restarts by sending crafted SOAP messages. This affects Mobile Network Operator internal RAN management networks running software versions earlier than 24R1-SR 1.0 MP. The service automatically restarts without permanent damage or network disruption.

💻 Affected Systems

Products:
  • Nokia Single RAN baseband OAM service
Versions: All versions earlier than release 24R1-SR 1.0 MP
Operating Systems: Not specified - embedded telecom system
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems within MNO internal RAN management networks where SOAP messages can be sent to the OAM service.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Repeated exploitation could cause service availability issues through denial-of-service, potentially disrupting RAN management operations.

🟠

Likely Case

Temporary OAM service restart with automatic recovery, causing brief management interruption but no network service degradation.

🟢

If Mitigated

Minimal impact with proper network segmentation and access controls limiting SOAP message sources.

🌐 Internet-Facing: LOW - The vulnerability requires access to the internal MNO RAN management network, not internet-facing interfaces.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this to disrupt OAM services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Requires crafting specific SOAP messages but no authentication needed

Exploitation requires network access to the OAM service interface and knowledge of SOAP protocol.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 24R1-SR 1.0 MP and later

Vendor Advisory: https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2025-24328/

Restart Required: Yes

Instructions:

1. Download update from Nokia support portal. 2. Apply patch following Nokia Single RAN upgrade procedures. 3. Verify service is running version 24R1-SR 1.0 MP or later.

🔧 Temporary Workarounds

Network segmentation and access control

all

Restrict access to OAM service SOAP interface to only authorized management systems

SOAP message filtering

all

Implement network filtering or WAF rules to block malformed SOAP messages

🧯 If You Can't Patch

  • Implement strict network access controls to limit which systems can send SOAP messages to the OAM service
  • Monitor for unusual SOAP traffic patterns and OAM service restart events

🔍 How to Verify

Check if Vulnerable:

Check software version via Nokia Single RAN management interface or CLI commands

Check Version:

Use Nokia-specific CLI commands for Single RAN version checking (vendor-specific)

Verify Fix Applied:

Confirm version is 24R1-SR 1.0 MP or later and monitor for OAM service stability

📡 Detection & Monitoring

Log Indicators:

  • OAM service restart events
  • Stack overflow errors in system logs
  • Unusual SOAP message patterns

Network Indicators:

  • Abnormal SOAP traffic to OAM service port
  • Repeated connection attempts to OAM service

SIEM Query:

source="nokia-oam" AND (event_type="service_restart" OR error="stack_overflow")

🔗 References

📤 Share & Export