CVE-2025-30077

6.2 MEDIUM

📋 TL;DR

This vulnerability in ONOS onos-lib-go allows an attacker to trigger an index out-of-range panic in the ASN.1 APER GetBitString function when a zero value is passed for numBits. This affects systems using SD-RAN ONOS with the vulnerable library version, potentially causing denial of service.

💻 Affected Systems

Products:
  • Open Networking Foundation SD-RAN ONOS
  • onos-lib-go library
Versions: onos-lib-go 0.10.28
Operating Systems: Linux-based systems running ONOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the vulnerable ASN.1 APER decoding functionality with specific malformed inputs.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption through denial of service, potentially affecting SD-RAN network operations and availability.

🟠

Likely Case

Service instability or crashes in affected ONOS components, leading to temporary network management disruptions.

🟢

If Mitigated

Minimal impact if proper input validation and error handling are implemented at application layer.

🌐 Internet-Facing: MEDIUM - While the vulnerability requires specific conditions, internet-exposed SD-RAN management interfaces could be targeted.
🏢 Internal Only: MEDIUM - Internal SD-RAN management systems could be affected by malicious or malformed inputs.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specifically crafted ASN.1 encoded data to trigger the zero numBits condition.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check latest onos-lib-go releases after 0.10.28

Vendor Advisory: https://github.com/onosproject/onos-lib-go/issues/295

Restart Required: Yes

Instructions:

1. Update onos-lib-go to patched version. 2. Rebuild and redeploy affected ONOS components. 3. Restart ONOS services.

🔧 Temporary Workarounds

Input validation wrapper

all

Implement application-level validation to reject zero numBits values before passing to GetBitString

# Implement custom validation in code calling GetBitString

🧯 If You Can't Patch

  • Implement network segmentation to isolate SD-RAN management interfaces
  • Deploy rate limiting and input sanitization at API gateways

🔍 How to Verify

Check if Vulnerable:

Check onos-lib-go version in use: grep -r "0.10.28" in dependency files

Check Version:

grep onos-lib-go go.mod || check package manager for version

Verify Fix Applied:

Verify updated version is deployed and test ASN.1 decoding with edge cases

📡 Detection & Monitoring

Log Indicators:

  • PANIC messages containing 'index out of range'
  • ASN.1 decoding errors
  • ONOS service crashes

Network Indicators:

  • Unusual ASN.1 encoded traffic to ONOS management ports
  • Repeated connection attempts with malformed data

SIEM Query:

source="onos" AND ("panic" OR "out of range" OR "GetBitString")

🔗 References

📤 Share & Export