CVE-2025-29315

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass Shiro-based RBAC controls in OpenDaylight SFC, enabling unauthorized execution of privileged operations. It affects OpenDaylight Service Function Chaining (SFC) Subproject SFC Sodium-SR4 and earlier versions. Organizations using these versions for network function virtualization are at risk.

💻 Affected Systems

Products:
  • OpenDaylight Service Function Chaining (SFC) Subproject
Versions: Sodium-SR4 and below
Operating Systems: Any OS running OpenDaylight
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments using Shiro-based RBAC in the SFC component. The vulnerability is in the RBAC mechanism itself.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of the OpenDaylight controller allowing attackers to manipulate network traffic, deploy malicious functions, or disrupt entire network infrastructure.

🟠

Likely Case

Unauthorized access to sensitive network configurations, service chain manipulation, or privilege escalation within the SDN environment.

🟢

If Mitigated

Limited impact with proper network segmentation, but still potential for lateral movement if other vulnerabilities exist.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires crafting specific requests to bypass RBAC checks. While no public PoC exists, the CVSS 9.8 score suggests exploitation is feasible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Monitor OpenDaylight security advisories for patch availability. 2. Upgrade to a fixed version once released. 3. Restart OpenDaylight services after patching.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate OpenDaylight SFC instances from untrusted networks and limit access to authorized administrators only.

Use firewall rules to restrict access to OpenDaylight management interfaces (typically port 8181)

Enhanced Monitoring

all

Implement strict monitoring of RBAC-related logs and network traffic to detect unauthorized access attempts.

Configure audit logging for all RBAC operations in OpenDaylight

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach OpenDaylight management interfaces.
  • Deploy additional authentication layers (e.g., VPN, client certificates) before reaching OpenDaylight.

🔍 How to Verify

Check if Vulnerable:

Check OpenDaylight version: If running SFC Sodium-SR4 or earlier, assume vulnerable. Review configuration for Shiro RBAC usage in SFC.

Check Version:

Check OpenDaylight web interface or logs for version information, or use: curl -u admin:admin http://<odl-ip>:8181/restconf/operational/opendaylight-inventory:nodes/

Verify Fix Applied:

Once patched, verify version is above Sodium-SR4 and test RBAC controls with unauthorized requests.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized RBAC bypass attempts in OpenDaylight logs
  • Unexpected privileged operations from non-admin users

Network Indicators:

  • Unusual HTTP requests to OpenDaylight REST API endpoints (port 8181)
  • Traffic patterns suggesting RBAC bypass attempts

SIEM Query:

source="opendaylight" AND (event_type="rbac_failure" OR event_type="unauthorized_access")

🔗 References

📤 Share & Export