Skip to main content

CVE-2025-24335: Vulnerability in Nokia Nokia Single RAN

Low
VulnerabilityCVE-2025-24335cvecve-2025-24335
Published: Wed Jul 02 2025 (07/02/2025, 08:35:46 UTC)
Source: CVE Database V5
Vendor/Project: Nokia
Product: Nokia Single RAN

Description

Nokia Single RAN baseband software versions earlier than 24R1-SR 2.1 MP contain a SOAP message input validation flaw, which in theory could potentially be used for causing resource exhaustion in the Single RAN baseband OAM service. No practical exploit has been detected for this flaw. However, the issue has been corrected starting from release 24R1-SR 2.1 MP by adding sufficient input validation for received SOAP requests, effectively mitigating the reported issue.

AI-Powered Analysis

AILast updated: 07/02/2025, 08:54:31 UTC

Technical Analysis

CVE-2025-24335 is a vulnerability identified in Nokia Single RAN baseband software versions prior to 24R1-SR 2.1 MP. The flaw resides in the input validation of SOAP messages processed by the Single RAN baseband Operations, Administration, and Maintenance (OAM) service. Specifically, insufficient validation of incoming SOAP requests could theoretically be exploited to cause resource exhaustion on the affected system. Resource exhaustion attacks typically aim to overwhelm system resources such as CPU, memory, or network bandwidth, potentially leading to denial of service (DoS) conditions. Although no practical exploit has been observed in the wild, the vulnerability represents a risk vector because the affected OAM service is critical for managing and maintaining the Single RAN baseband, which is a core component in mobile network infrastructure. The issue has been addressed in Nokia software release 24R1-SR 2.1 MP by implementing robust input validation mechanisms for SOAP requests, effectively mitigating the vulnerability. The absence of a CVSS score indicates that the vulnerability is recognized but not yet fully assessed for severity. Given the nature of the flaw and its potential impact, it is important for operators using affected versions to apply the patch promptly to prevent any exploitation attempts that could disrupt network operations.

Potential Impact

For European organizations, particularly telecommunications providers and mobile network operators utilizing Nokia Single RAN infrastructure, this vulnerability could pose a risk to network availability and service continuity. Resource exhaustion attacks targeting the OAM service could degrade or disrupt the management capabilities of the baseband equipment, potentially leading to partial or full service outages affecting mobile users. Such disruptions could impact critical communications, emergency services, and business operations relying on mobile connectivity. Additionally, service outages could lead to reputational damage and regulatory scrutiny under frameworks such as the EU NIS Directive, which mandates the security and resilience of critical infrastructure. Although no active exploitation has been reported, the theoretical risk necessitates proactive mitigation to maintain network stability and compliance with European cybersecurity standards.

Mitigation Recommendations

European organizations should prioritize upgrading Nokia Single RAN baseband software to version 24R1-SR 2.1 MP or later, where the vulnerability has been fixed. Network operators should implement strict access controls and network segmentation to limit exposure of the OAM service to trusted management networks only. Monitoring and logging of SOAP request traffic to the OAM service should be enhanced to detect anomalous patterns indicative of resource exhaustion attempts. Additionally, deploying rate limiting or traffic filtering at the network edge can help mitigate potential abuse of the SOAP interface. Regular vulnerability assessments and penetration testing focused on management interfaces can identify residual risks. Operators should also maintain close communication with Nokia for any further advisories or patches related to this vulnerability. Finally, incident response plans should be updated to include scenarios involving OAM service disruption to ensure rapid recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Nokia
Date Reserved
2025-01-20T05:33:25.524Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6864f0416f40f0eb729218b8

Added to database: 7/2/2025, 8:39:29 AM

Last enriched: 7/2/2025, 8:54:31 AM

Last updated: 7/4/2025, 5:23:26 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats