CVE-2024-34487
Description
OFPFlowStats in parser.py in Faucet SDN Ryu 4.34 allows attackers to cause a denial of service (infinite loop) via inst.length=0.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An infinite loop vulnerability in Ryu SDN framework's OFPFlowStats parser allows denial of service via a crafted OpenFlow message with inst.length=0.
Vulnerability
Description
The vulnerability resides in the OFPFlowStats parser within ofproto_v1_3_parser.py of the Faucet SDN Ryu framework (version 4.34). When parsing OpenFlow instruction sets, the code uses a while loop that decrements inst_length by inst.len. If inst.len is zero, the loop never terminates, causing an infinite loop and CPU exhaustion [1]. This is triggered by a malformed OFPFlowStats reply where an instruction has a length field of zero.
Exploitation
An attacker can exploit this flaw by sending a specially crafted OpenFlow message to the Ryu controller (default port 6633). The PoC provided in the advisory demonstrates remote exploitation without authentication, as the vulnerable parser is invoked upon receiving the message [1]. The attack does not require any special privileges beyond network access to the controller.
Impact
Successful exploitation leads to a denial of service (DoS) as the Ryu controller becomes unresponsive, halting all network control operations managed by the SDN controller. This can disrupt traffic forwarding, policy enforcement, and network monitoring in environments relying on Ryu [1][2].
Mitigation
As of the advisory, the Ryu project is not currently maintained and no official patch exists [3]. Users are strongly advised to migrate to actively maintained alternatives such as OpenStack's os-ken. Workarounds include restricting network access to the OpenFlow port or deploying intrusion detection to filter malicious messages [2].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
ryuPyPI | <= 4.34 | — |
Affected products
2- Faucet SDN/Faucet SDN Ryudescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-m9vm-8mv9-v5v3ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-34487ghsaADVISORY
- github.com/faucetsdn/ryu/issues/192ghsaWEB
News mentions
0No linked articles in our index yet.