CVE-2025-24335: Vulnerability in Nokia Nokia Single RAN
Nokia Single RAN baseband software versions earlier than 24R1-SR 2.1 MP contain a SOAP message input validation flaw, which in theory could potentially be used for causing resource exhaustion in the Single RAN baseband OAM service. No practical exploit has been detected for this flaw. However, the issue has been corrected starting from release 24R1-SR 2.1 MP by adding sufficient input validation for received SOAP requests, effectively mitigating the reported issue.
AI Analysis
Technical Summary
CVE-2025-24335 is a vulnerability identified in Nokia Single RAN baseband software versions prior to 24R1-SR 2.1 MP. The flaw resides in the input validation of SOAP messages processed by the Single RAN baseband Operations, Administration, and Maintenance (OAM) service. Specifically, insufficient validation of incoming SOAP requests could theoretically be exploited to cause resource exhaustion on the affected system. Resource exhaustion attacks typically aim to overwhelm system resources such as CPU, memory, or network bandwidth, potentially leading to denial of service (DoS) conditions. Although no practical exploit has been observed in the wild, the vulnerability represents a risk vector because the affected OAM service is critical for managing and maintaining the Single RAN baseband, which is a core component in mobile network infrastructure. The issue has been addressed in Nokia software release 24R1-SR 2.1 MP by implementing robust input validation mechanisms for SOAP requests, effectively mitigating the vulnerability. The absence of a CVSS score indicates that the vulnerability is recognized but not yet fully assessed for severity. Given the nature of the flaw and its potential impact, it is important for operators using affected versions to apply the patch promptly to prevent any exploitation attempts that could disrupt network operations.
Potential Impact
For European organizations, particularly telecommunications providers and mobile network operators utilizing Nokia Single RAN infrastructure, this vulnerability could pose a risk to network availability and service continuity. Resource exhaustion attacks targeting the OAM service could degrade or disrupt the management capabilities of the baseband equipment, potentially leading to partial or full service outages affecting mobile users. Such disruptions could impact critical communications, emergency services, and business operations relying on mobile connectivity. Additionally, service outages could lead to reputational damage and regulatory scrutiny under frameworks such as the EU NIS Directive, which mandates the security and resilience of critical infrastructure. Although no active exploitation has been reported, the theoretical risk necessitates proactive mitigation to maintain network stability and compliance with European cybersecurity standards.
Mitigation Recommendations
European organizations should prioritize upgrading Nokia Single RAN baseband software to version 24R1-SR 2.1 MP or later, where the vulnerability has been fixed. Network operators should implement strict access controls and network segmentation to limit exposure of the OAM service to trusted management networks only. Monitoring and logging of SOAP request traffic to the OAM service should be enhanced to detect anomalous patterns indicative of resource exhaustion attempts. Additionally, deploying rate limiting or traffic filtering at the network edge can help mitigate potential abuse of the SOAP interface. Regular vulnerability assessments and penetration testing focused on management interfaces can identify residual risks. Operators should also maintain close communication with Nokia for any further advisories or patches related to this vulnerability. Finally, incident response plans should be updated to include scenarios involving OAM service disruption to ensure rapid recovery.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2025-24335: Vulnerability in Nokia Nokia Single RAN
Description
Nokia Single RAN baseband software versions earlier than 24R1-SR 2.1 MP contain a SOAP message input validation flaw, which in theory could potentially be used for causing resource exhaustion in the Single RAN baseband OAM service. No practical exploit has been detected for this flaw. However, the issue has been corrected starting from release 24R1-SR 2.1 MP by adding sufficient input validation for received SOAP requests, effectively mitigating the reported issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-24335 is a vulnerability identified in Nokia Single RAN baseband software versions prior to 24R1-SR 2.1 MP. The flaw resides in the input validation of SOAP messages processed by the Single RAN baseband Operations, Administration, and Maintenance (OAM) service. Specifically, insufficient validation of incoming SOAP requests could theoretically be exploited to cause resource exhaustion on the affected system. Resource exhaustion attacks typically aim to overwhelm system resources such as CPU, memory, or network bandwidth, potentially leading to denial of service (DoS) conditions. Although no practical exploit has been observed in the wild, the vulnerability represents a risk vector because the affected OAM service is critical for managing and maintaining the Single RAN baseband, which is a core component in mobile network infrastructure. The issue has been addressed in Nokia software release 24R1-SR 2.1 MP by implementing robust input validation mechanisms for SOAP requests, effectively mitigating the vulnerability. The absence of a CVSS score indicates that the vulnerability is recognized but not yet fully assessed for severity. Given the nature of the flaw and its potential impact, it is important for operators using affected versions to apply the patch promptly to prevent any exploitation attempts that could disrupt network operations.
Potential Impact
For European organizations, particularly telecommunications providers and mobile network operators utilizing Nokia Single RAN infrastructure, this vulnerability could pose a risk to network availability and service continuity. Resource exhaustion attacks targeting the OAM service could degrade or disrupt the management capabilities of the baseband equipment, potentially leading to partial or full service outages affecting mobile users. Such disruptions could impact critical communications, emergency services, and business operations relying on mobile connectivity. Additionally, service outages could lead to reputational damage and regulatory scrutiny under frameworks such as the EU NIS Directive, which mandates the security and resilience of critical infrastructure. Although no active exploitation has been reported, the theoretical risk necessitates proactive mitigation to maintain network stability and compliance with European cybersecurity standards.
Mitigation Recommendations
European organizations should prioritize upgrading Nokia Single RAN baseband software to version 24R1-SR 2.1 MP or later, where the vulnerability has been fixed. Network operators should implement strict access controls and network segmentation to limit exposure of the OAM service to trusted management networks only. Monitoring and logging of SOAP request traffic to the OAM service should be enhanced to detect anomalous patterns indicative of resource exhaustion attempts. Additionally, deploying rate limiting or traffic filtering at the network edge can help mitigate potential abuse of the SOAP interface. Regular vulnerability assessments and penetration testing focused on management interfaces can identify residual risks. Operators should also maintain close communication with Nokia for any further advisories or patches related to this vulnerability. Finally, incident response plans should be updated to include scenarios involving OAM service disruption to ensure rapid recovery.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Nokia
- Date Reserved
- 2025-01-20T05:33:25.524Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6864f0416f40f0eb729218b8
Added to database: 7/2/2025, 8:39:29 AM
Last enriched: 7/2/2025, 8:54:31 AM
Last updated: 7/4/2025, 5:23:26 AM
Views: 7
Related Threats
CVE-2025-5920: CWE-201 Insertion of Sensitive Information Into Sent Data in Sharable Password Protected Posts
HighCVE-2025-53569: CWE-352 Cross-Site Request Forgery (CSRF) in Trust Payments Trust Payments Gateway for WooCommerce (JavaScript Library)
MediumCVE-2025-53568: CWE-352 Cross-Site Request Forgery (CSRF) in Tony Zeoli Radio Station
MediumCVE-2025-53566: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in osama.esh WP Visitor Statistics (Real Time Traffic)
MediumCVE-2025-30983: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in gopiplus Card flip image slideshow
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.