CVE-2025-29314

8.1 HIGH

📋 TL;DR

This vulnerability allows attackers to intercept and access sensitive information transmitted via insecure Shiro cookies in OpenDaylight SFC. Attackers can perform man-in-the-middle attacks to steal session data or credentials. Organizations using OpenDaylight Service Function Chaining Sodium-SR4 or earlier versions are affected.

💻 Affected Systems

Products:
  • OpenDaylight Service Function Chaining (SFC) Subproject
Versions: Sodium-SR4 and all earlier versions
Operating Systems: Any OS running OpenDaylight SFC
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations with Shiro cookie configurations are vulnerable. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of sensitive data including administrative credentials, session tokens, and configuration secrets leading to full system takeover.

🟠

Likely Case

Unauthorized access to sensitive information such as session data, potentially enabling privilege escalation or lateral movement.

🟢

If Mitigated

Limited impact with proper network segmentation and encryption controls in place, though risk remains for exposed systems.

🌐 Internet-Facing: HIGH - Internet-facing instances are directly vulnerable to man-in-the-middle attacks from external threat actors.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable to insider threats or compromised internal hosts performing MITM attacks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires man-in-the-middle position and knowledge of Shiro cookie handling. No authentication bypass needed once MITM is established.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after Sodium-SR4

Vendor Advisory: https://blog.csdn.net/weixin_43959580/article/details/146018166

Restart Required: No

Instructions:

1. Upgrade OpenDaylight SFC to a version newer than Sodium-SR4. 2. Verify Shiro cookie configurations are properly secured. 3. Test functionality after upgrade.

🔧 Temporary Workarounds

Enable HTTPS/TLS encryption

all

Force all communications to use encrypted HTTPS/TLS to prevent cookie interception

Configure SSL/TLS on all OpenDaylight interfaces
Disable HTTP-only access

Implement network segmentation

all

Isolate OpenDaylight SFC instances from untrusted networks

Configure firewall rules to restrict access
Implement VLAN segmentation

🧯 If You Can't Patch

  • Implement strict network access controls and segmentation
  • Deploy TLS/SSL encryption for all communications and disable HTTP

🔍 How to Verify

Check if Vulnerable:

Check OpenDaylight SFC version and verify if using Sodium-SR4 or earlier. Review Shiro cookie configuration settings.

Check Version:

Check OpenDaylight documentation or configuration files for version information

Verify Fix Applied:

Confirm version is newer than Sodium-SR4 and test that cookies are properly encrypted and secured.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns
  • Multiple failed login attempts from same session
  • Session hijacking indicators

Network Indicators:

  • Unencrypted cookie transmission
  • MITM attack patterns in network traffic
  • Unusual protocol usage

SIEM Query:

Search for: 'OpenDaylight SFC' AND ('unencrypted cookie' OR 'session hijack' OR 'MITM')

🔗 References

📤 Share & Export