CVE-2024-34489
Description
OFPHello in parser.py in Faucet SDN Ryu 4.34 allows attackers to cause a denial of service (infinite loop) via length=0.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A flaw in Faucet SDN Ryu's OFPHello parser allows denial of service (infinite loop) via a crafted length=0 field in an OpenFlow Hello message.
The vulnerability resides in the parser method of the OFPHello class within Ryu's OFPHello parser (e.g., ofproto_v1_3_parser.py). When processing an OpenFlow Hello message, the parser iterates over a list of elements using a while loop that increments an offset by the element's length field. If an attacker supplies a zero-length element, the offset never advances, causing the loop to iterate infinitely [1][3]. This effectively halts the controller's processing of any further messages.
Exploitation is straightforward and requires no authentication. An attacker simply sends a specially crafted OpenFlow Hello packet with a zero-length element to the controller's OpenFlow port (default 6633). Since the Hello message is the first message exchanged during OpenFlow handshake, the attack can be launched before any legitimate connection is fully established, making it trivially easy to trigger [3].
Impact
A successful attack results in a complete denial of service: the Ryu controller enters an infinite loop, consuming CPU resources and becoming unresponsive to all network operations. Because the loop occurs in the parser of the very first handshake message, no other OpenFlow messages are processed, and the controller cannot recover without manual intervention or restart [1][3].
Mitigation
As of the disclosure, the Ryu project is not currently maintained (see the project README) [2]. No official patch has been released. Users are advised to migrate to maintained alternatives such as OpenStack's os-ken project [2]. There is no known workaround other than avoiding exposure of the Ryu controller to untrusted networks.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
ryuPyPI | <= 4.34 | — |
Affected products
2- Faucet SDN/Faucet SDN Ryudescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-59p2-v62x-gxj8ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-34489ghsaADVISORY
- github.com/faucetsdn/ryu/issues/195ghsaWEB
News mentions
0No linked articles in our index yet.