CVE-2024-34488
Description
OFPMultipartReply in parser.py in Faucet SDN Ryu 4.34 allows attackers to cause a denial of service (infinite loop) via b.length=0.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A crafted OpenFlow multipart reply with b.length=0 triggers an infinite loop in Ryu's parser, enabling unauthenticated denial of service.
Vulnerability
CVE-2024-34487 is a denial-of-service vulnerability in the OFPMultipartReply.parser method within Ryu's ofproto_v1_3_parser.py. The parsing loop advances an offset by b.length or b.len but does not validate that this value is non‑zero. When an attacker sends a specially crafted multipart reply message with b.length=0, the offset never increases, causing an infinite loop and CPU exhaustion [1].
Attack
Vector
An unauthenticated attacker on the same network as a Ryu‑based controller can send a single malicious OpenFlow message to TCP port 6633 (the default OpenFlow port). No prior authentication or session is required. The proof‑of‑concept payload included in the advisory demonstrates the exact byte sequence that triggers the flaw [1].
Impact
Successful exploitation results in a persistent denial‑of‑service condition: the controller process hangs indefinitely in the parsing loop and must be restarted. Because Ryu is a component‑based SDN framework, this can disrupt all network control functions managed by the controller, potentially affecting traffic forwarding, flow setup, and network visibility.
Mitigation
As of the advisory date, the Ryu project is not currently maintained [3]. No official patch has been released. Users are strongly advised to migrate to the maintained fork os-ken (https://github.com/openstack/os-ken) or to apply network‑level restrictions that limit OpenFlow access to trusted switches only. The issue has been public since May 2024 and the project maintainers have been notified via the GitHub issue tracker [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
ryuPyPI | <= 4.34 | — |
Affected products
2- Faucet SDN/Faucet SDN Ryudescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-ffp9-pfq9-g2wwghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-34488ghsaADVISORY
- github.com/faucetsdn/ryu/issues/191ghsaWEB
News mentions
0No linked articles in our index yet.