CVE-2024-34483
Description
OFPGroupDescStats in parser.py in Faucet SDN Ryu 4.34 allows attackers to cause a denial of service (infinite loop) via OFPBucket.len=0.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A crafted OpenFlow message with OFPBucket.len=0 causes an infinite loop in Ryu's OFPGroupDescStats parser, leading to denial of service.
Vulnerability
Overview
CVE-2024-34483 is a denial-of-service vulnerability in the Ryu SDN framework (version 4.34). The flaw resides in the OFPGroupDescStats parser inside parser.py (specifically in ofproto_v1_3_parser.py). When parsing group description statistics messages, the parser iterates over buckets using their len field to advance the offset. If OFPBucket.len is set to zero, the loop's offset and length variables never increment, causing an infinite loop that hangs the controller [1][3].
Exploitation
Conditions
An attacker must be able to send crafted OpenFlow messages to the Ryu controller. No authentication is required if the controller accepts connections from untrusted networks (default port 6633). The proof-of-concept provided uses an OFPGroupDescStatsReply message with a malicious bucket length of zero, demonstrating that a single packet can trigger the infinite loop [3].
Impact
Successful exploitation leads to a complete denial of service—the controller becomes unresponsive, cannot process further messages, and effectively stops managing the SDN network. This can disrupt all network flows controlled by Ryu [1][3].
Mitigation
Status
The Ryu project is not currently maintained (as noted on its GitHub page). No official patch has been released. Users are advised to migrate to a maintained fork such as OpenStack's os-ken. Until migration, network administrators should restrict access to the Ryu controller to trusted hosts only, and consider deploying intrusion detection to filter malformed OpenFlow messages [2].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
ryuPyPI | <= 4.34 | — |
Affected products
2- Faucet SDN/Faucet SDN Ryudescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-7hmm-wg23-2w7mghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-34483ghsaADVISORY
- github.com/faucetsdn/ryu/issues/193ghsaWEB
News mentions
0No linked articles in our index yet.