CVE-2025-57446: n/a
An issue in O-RAN Near Realtime RIC ric-plt-submgr in the J-Release environment, allows remote attackers to cause a denial of service (DoS) via a crafted request to the Subscription Manager API component.
AI Analysis
Technical Summary
CVE-2025-57446 is a denial of service (DoS) vulnerability identified in the O-RAN Near Real-time RIC (RAN Intelligent Controller) component named ric-plt-submgr, specifically within the Subscription Manager API in the J-Release environment. The O-RAN architecture is an open and interoperable radio access network framework designed to enable more flexible and intelligent 5G network management. The Near Real-time RIC is a critical component responsible for managing and optimizing radio resources with low latency. The vulnerability allows remote attackers to send specially crafted requests to the Subscription Manager API, which handles subscription-related operations within the ric-plt-submgr module. Exploiting this flaw can cause the targeted component to crash or become unresponsive, resulting in a denial of service condition. This disruption can degrade or interrupt the functionality of the Near Real-time RIC, potentially impacting the overall performance and reliability of the 5G RAN infrastructure that relies on it. The vulnerability does not currently have a CVSS score, no patches or mitigations have been published yet, and there are no known exploits in the wild. The lack of version specifics suggests the issue may affect multiple or all versions of the J-Release environment of the ric-plt-submgr. Given the critical role of the Near Real-time RIC in managing radio resources and network intelligence, a DoS attack could have significant operational consequences for mobile network operators deploying O-RAN based 5G networks.
Potential Impact
For European organizations, particularly telecom operators and infrastructure providers deploying O-RAN based 5G networks, this vulnerability poses a risk of service disruption. A successful DoS attack against the ric-plt-submgr Subscription Manager API could degrade network performance, reduce availability of 5G services, and impact end-user experience. This could affect critical services relying on 5G connectivity, including IoT deployments, industrial automation, and emergency communications. Additionally, network operators may face increased operational costs due to incident response and potential SLA violations. The disruption of the Near Real-time RIC could also hinder dynamic network optimization capabilities, reducing the efficiency and adaptability of the RAN. While no known exploits exist yet, the public disclosure of this vulnerability could motivate threat actors to develop exploits targeting 5G infrastructure, which is strategically important in Europe’s digital economy and critical infrastructure landscape.
Mitigation Recommendations
Given the absence of patches or official mitigations, European organizations should implement the following specific measures: 1) Monitor network traffic to the Subscription Manager API for anomalous or malformed requests that could indicate exploitation attempts. 2) Employ strict access controls and network segmentation to limit exposure of the ric-plt-submgr component to untrusted networks or users. 3) Implement rate limiting and input validation at the API gateway or firewall level to reduce the risk of crafted requests causing DoS. 4) Engage with O-RAN software vendors and open-source communities to track patch releases and apply updates promptly once available. 5) Conduct thorough testing in controlled environments to understand the vulnerability’s impact and develop incident response playbooks tailored to potential DoS scenarios. 6) Collaborate with national cybersecurity agencies and industry groups to share threat intelligence and mitigation strategies related to O-RAN vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland
CVE-2025-57446: n/a
Description
An issue in O-RAN Near Realtime RIC ric-plt-submgr in the J-Release environment, allows remote attackers to cause a denial of service (DoS) via a crafted request to the Subscription Manager API component.
AI-Powered Analysis
Technical Analysis
CVE-2025-57446 is a denial of service (DoS) vulnerability identified in the O-RAN Near Real-time RIC (RAN Intelligent Controller) component named ric-plt-submgr, specifically within the Subscription Manager API in the J-Release environment. The O-RAN architecture is an open and interoperable radio access network framework designed to enable more flexible and intelligent 5G network management. The Near Real-time RIC is a critical component responsible for managing and optimizing radio resources with low latency. The vulnerability allows remote attackers to send specially crafted requests to the Subscription Manager API, which handles subscription-related operations within the ric-plt-submgr module. Exploiting this flaw can cause the targeted component to crash or become unresponsive, resulting in a denial of service condition. This disruption can degrade or interrupt the functionality of the Near Real-time RIC, potentially impacting the overall performance and reliability of the 5G RAN infrastructure that relies on it. The vulnerability does not currently have a CVSS score, no patches or mitigations have been published yet, and there are no known exploits in the wild. The lack of version specifics suggests the issue may affect multiple or all versions of the J-Release environment of the ric-plt-submgr. Given the critical role of the Near Real-time RIC in managing radio resources and network intelligence, a DoS attack could have significant operational consequences for mobile network operators deploying O-RAN based 5G networks.
Potential Impact
For European organizations, particularly telecom operators and infrastructure providers deploying O-RAN based 5G networks, this vulnerability poses a risk of service disruption. A successful DoS attack against the ric-plt-submgr Subscription Manager API could degrade network performance, reduce availability of 5G services, and impact end-user experience. This could affect critical services relying on 5G connectivity, including IoT deployments, industrial automation, and emergency communications. Additionally, network operators may face increased operational costs due to incident response and potential SLA violations. The disruption of the Near Real-time RIC could also hinder dynamic network optimization capabilities, reducing the efficiency and adaptability of the RAN. While no known exploits exist yet, the public disclosure of this vulnerability could motivate threat actors to develop exploits targeting 5G infrastructure, which is strategically important in Europe’s digital economy and critical infrastructure landscape.
Mitigation Recommendations
Given the absence of patches or official mitigations, European organizations should implement the following specific measures: 1) Monitor network traffic to the Subscription Manager API for anomalous or malformed requests that could indicate exploitation attempts. 2) Employ strict access controls and network segmentation to limit exposure of the ric-plt-submgr component to untrusted networks or users. 3) Implement rate limiting and input validation at the API gateway or firewall level to reduce the risk of crafted requests causing DoS. 4) Engage with O-RAN software vendors and open-source communities to track patch releases and apply updates promptly once available. 5) Conduct thorough testing in controlled environments to understand the vulnerability’s impact and develop incident response playbooks tailored to potential DoS scenarios. 6) Collaborate with national cybersecurity agencies and industry groups to share threat intelligence and mitigation strategies related to O-RAN vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-17T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68d56a80611617954beac298
Added to database: 9/25/2025, 4:14:56 PM
Last enriched: 9/25/2025, 4:17:06 PM
Last updated: 9/25/2025, 5:53:20 PM
Views: 4
Related Threats
CVE-2025-10975: Deserialization in GuanxingLu vlarl
MediumCVE-2025-10974: Deserialization in giantspatula SewKinect
MediumCVE-2025-26482: CWE-1258: Exposure of Sensitive System Information Due to Uncleared Debug Information in Dell PowerEdge R770
MediumCVE-2025-10973: SQL Injection in JackieDYH Resume-management-system
MediumCVE-2025-11005: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TOTOLINK X6000R
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.