VYPR
High severityNVD Advisory· Published Apr 8, 2024· Updated Aug 21, 2024

CVE-2024-28732

CVE-2024-28732

Description

An issue was discovered in OFPMatch in parser.py in Faucet SDN Ryu version 4.34, allows remote attackers to cause a denial of service (DoS) (infinite loop).

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An infinite loop vulnerability in Ryu SDN framework's OFPMatch parser allows remote attackers to cause denial of service via a crafted OpenFlow message.

Vulnerability

Description

In Ryu SDN framework version 4.34, the OFPMatch parser in ofproto_v1_3_parser.py and other protocol parsers contains an infinite loop flaw. When parsing an OFPFlowMod message, an instruction with len set to zero causes the offset variable to not increment, resulting in an unbounded loop that consumes CPU resources [1][3].

Exploitation

A remote attacker can exploit this vulnerability by sending a crafted OpenFlow message to the Ryu controller (default port 6633). No authentication is required; the attacker only needs network access to the controller. The PoC demonstrates sending a specially crafted packet that triggers the infinite loop, disrupting controller operation [3].

Impact

Successful exploitation leads to a denial of service (DoS) condition, rendering the SDN controller unresponsive and unable to process legitimate network management requests. This can disrupt network operations managed by the Ryu controller [1][4].

Mitigation

As of the advisory, the Ryu project is not currently maintained [2]. Users are advised to migrate to a maintained alternative such as OpenStack's os-ken. No patch is available for this vulnerability; affected versions include v4.34 and likely earlier versions across OpenFlow 1.3, 1.4, and 1.5 [3][4].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
ryuPyPI
<= 4.34

Affected products

2
  • Faucet SDN/Faucet SDN Ryudescription
  • ghsa-coords
    Range: <= 4.34

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.