CVE-2025-29310

9.8 CRITICAL

📋 TL;DR

A critical vulnerability in ONOS v2.7.0 allows attackers to execute arbitrary commands or access network information by sending a specially crafted LLDP packet. This affects any system running the vulnerable ONOS version that processes LLDP packets. Attackers can potentially gain full control of affected network controllers.

💻 Affected Systems

Products:
  • ONOS (Open Network Operating System)
Versions: v2.7.0
Operating Systems: Linux-based systems where ONOS is deployed
Default Config Vulnerable: ⚠️ Yes
Notes: Any ONOS deployment using the default configuration that processes LLDP packets is vulnerable. The vulnerability is in the packet deserialization component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the ONOS controller allowing attackers to execute arbitrary commands, modify network configurations, intercept traffic, and potentially pivot to other network systems.

🟠

Likely Case

Unauthorized access to network information, potential denial of service, and limited command execution within the ONOS environment.

🟢

If Mitigated

Limited impact if network segmentation prevents external access to ONOS management interfaces and LLDP packet filtering is implemented.

🌐 Internet-Facing: HIGH - If ONOS management interfaces are exposed to the internet, attackers can exploit this remotely without authentication.
🏢 Internal Only: HIGH - Even internally, any attacker with network access to ONOS can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The GitHub gist contains technical details and likely exploit code. Attackers can craft malicious LLDP packets without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Monitor ONOS project announcements for patches. 2. Consider upgrading to a newer version if available. 3. Apply workarounds immediately.

🔧 Temporary Workarounds

Block LLDP packets to ONOS

linux

Configure network firewalls or ONOS itself to drop or filter LLDP packets before they reach the vulnerable component.

# Example iptables rule to block LLDP (EtherType 0x88cc) to ONOS port
iptables -A INPUT -p ether --ether-type 0x88cc -j DROP

Network segmentation

all

Isolate ONOS management interfaces from untrusted networks and limit which systems can send LLDP packets to ONOS.

🧯 If You Can't Patch

  • Implement strict network access controls to limit which systems can communicate with ONOS management interfaces.
  • Deploy intrusion detection systems to monitor for suspicious LLDP traffic patterns and potential exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Check ONOS version: cat $ONOS_HOME/VERSION or via ONOS CLI. If version is 2.7.0, the system is vulnerable.

Check Version:

cat /opt/onos/VERSION 2>/dev/null || echo 'Check ONOS installation directory'

Verify Fix Applied:

Verify that LLDP packet filtering is working by attempting to send LLDP packets and confirming they are blocked/dropped.

📡 Detection & Monitoring

Log Indicators:

  • Unusual LLDP packet processing errors
  • Unexpected command execution in ONOS logs
  • Abnormal network configuration changes

Network Indicators:

  • Malformed LLDP packets directed at ONOS management IPs
  • Unusual outbound connections from ONOS controller

SIEM Query:

source="onos" AND ("LLDP" OR "deserialization" OR "packet processing error")

🔗 References

📤 Share & Export