VYPR
High severityNVD Advisory· Published Aug 11, 2023· Updated Oct 9, 2024

CVE-2020-35141

CVE-2020-35141

Description

An issue was discovered in OFPQueueGetConfigReply in parser.py in Faucet SDN Ryu version 4.34, allows remote attackers to cause a denial of service (DoS) (infinite loop).

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A flaw in Ryu SDN framework's OFPQueueGetConfigReply parser triggers an infinite loop denial-of-service via crafted OpenFlow replies.

Root

Cause

CVE-2020-35141 is a denial-of-service vulnerability in the Faucet SDN Ryu framework version 4.34. The flaw resides in the OFPQueueGetConfigReply parser within parser.py (specifically in ofproto_v1_3_parser.py). The parser uses a while loop that increments an offset based on queue.len. If a crafted OpenFlow reply contains a queue with len=0, the offset never advances, causing the loop to run indefinitely [1][3].

Attack

Vector

An attacker can exploit this by sending a specially crafted OFPQueueGetConfigReply message to a Ryu controller that processes the malformed queue configuration. The attack is remote; no authentication is required because the parser processes untrusted network data before any validation occurs [1].

Impact

The infinite loop consumes 100% CPU in the event loop, effectively crashing the controller process and stopping all network control operations. This constitutes a complete denial-of-service for the software-defined network controlled by the vulnerable Ryu instance [1].

Mitigation

The Ryu project is no longer actively maintained [2]. Users should migrate to the maintained OpenStack fork os-ken as no patched Ryu release is expected. There is no known workaround short of disabling the affected parser or upgrading to a different SDN framework [2][3].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
ryuPyPI
<= 4.34

Affected products

2
  • Faucet SDN/Ryudescription
  • ghsa-coords
    Range: <= 4.34

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.