CVE-2024-34484
Description
OFPBucket in parser.py in Faucet SDN Ryu 4.34 allows attackers to cause a denial of service (infinite loop) via action.len=0.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2024-34484: Faucet SDN Ryu 4.34 OFPBucket parser infinite loop via crafted action.len=0 causes denial of service.
CVE-2024-34484 is a denial-of-service (DoS) vulnerability in the Faucet SDN Ryu framework, version 4.34. The issue resides in the OFPBucket.parser method within /ryu/ofproto/ofproto_v1_3_parser.py. When parsing an OFPBucket, the method uses a while loop that increments offset and length by action.len for each parsed action. However, if an attacker sets action.len to zero, the loop never progresses, resulting in an infinite loop and resource exhaustion [1][3].
Exploitation
An attacker can trigger this vulnerability by sending a crafted OpenFlow message, specifically an OFPGroupDescStatsReply containing an OFPGroupDescStats structure with a malicious OFPBucket. The proof-of-concept (PoC) demonstrates sending such a packet to a Ryu controller listening on the default OpenFlow port (6633). No authentication is required to send OpenFlow messages; an attacker with network access to the controller can exploit this without prior credentials [3].
Impact
Successful exploitation causes the Ryu controller to enter an infinite loop, consuming 100% CPU and effectively halting processing of legitimate OpenFlow messages. This results in a denial of service for the controller, disrupting network operations and management in SDN environments relying on Ryu [1][3].
Mitigation
The Ryu project is no longer actively maintained. The GitHub repository states, 'RYU NOT CURRENTLY MAINTAINED' and recommends migrating to a maintained fork, such as OpenStack's os-ken [2]. No official patch is available for this CVE. Users of Ryu should consider migrating to the os-ken framework or implementing network-level filtering to block malformed OpenFlow messages from untrusted sources [2][3].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
ryuPyPI | <= 4.34 | — |
Affected products
2- Faucet SDN/Faucet SDN Ryudescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-c7w6-33j3-j3mxghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-34484ghsaADVISORY
- github.com/faucetsdn/ryu/issues/194ghsaWEB
News mentions
0No linked articles in our index yet.