CVE-2025-24335 (GCVE-0-2025-24335)
Vulnerability from cvelistv5 – Published: 2025-07-02 08:35 – Updated: 2025-07-02 13:26
VLAI?
Title
SOAP message input validation fault could in theory cause OAM service resource exhaustion
Summary
Nokia Single RAN baseband software versions earlier than 24R1-SR 2.1 MP contain a SOAP message input validation flaw, which in theory could potentially be used for causing resource exhaustion in the Single RAN baseband OAM service.
No practical exploit has been detected for this flaw. However, the issue has been corrected starting from release 24R1-SR 2.1 MP by adding sufficient input validation for received SOAP requests, effectively mitigating the reported issue.
Severity ?
CWE
- CWE-1287 - Improper Validation of Specified Type of Input
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Nokia | Nokia Single RAN |
Affected:
All the releases prior to 24R1-SR 2.1 MP
Unaffected: 24R1-SR 2.1 MP and later |
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 2,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-24335",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-02T13:26:34.467642Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1287",
"description": "CWE-1287 Improper Validation of Specified Type of Input",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-02T13:26:40.283Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Nokia Single RAN",
"vendor": "Nokia",
"versions": [
{
"status": "affected",
"version": "All the releases prior to 24R1-SR 2.1 MP"
},
{
"status": "unaffected",
"version": "24R1-SR 2.1 MP and later"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Nokia Single RAN baseband software versions earlier than 24R1-SR 2.1 MP contain a SOAP message input validation flaw, which in theory could potentially be used for causing resource exhaustion in the Single RAN baseband OAM service.\n\nNo practical exploit has been detected for this flaw. However, the issue has been corrected starting from release 24R1-SR 2.1 MP by adding sufficient input validation for received SOAP requests, effectively mitigating the reported issue."
}
],
"providerMetadata": {
"dateUpdated": "2025-07-02T08:35:46.346Z",
"orgId": "b48c3b8f-639e-4c16-8725-497bc411dad0",
"shortName": "Nokia"
},
"references": [
{
"name": "Nokia Security Advisory",
"url": "https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2025-24335/"
}
],
"title": "SOAP message input validation fault could in theory cause OAM service resource exhaustion",
"x_generator": {
"engine": "cveClient/1.0.15"
}
}
},
"cveMetadata": {
"assignerOrgId": "b48c3b8f-639e-4c16-8725-497bc411dad0",
"assignerShortName": "Nokia",
"cveId": "CVE-2025-24335",
"datePublished": "2025-07-02T08:35:46.346Z",
"dateReserved": "2025-01-20T05:33:25.524Z",
"dateUpdated": "2025-07-02T13:26:40.283Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 2, \"attackVector\": \"ADJACENT_NETWORK\", \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-24335\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-02T13:26:34.467642Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-1287\", \"description\": \"CWE-1287 Improper Validation of Specified Type of Input\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-02T13:17:39.339Z\"}}], \"cna\": {\"title\": \"SOAP message input validation fault could in theory cause OAM service resource exhaustion\", \"affected\": [{\"vendor\": \"Nokia\", \"product\": \"Nokia Single RAN\", \"versions\": [{\"status\": \"affected\", \"version\": \"All the releases prior to 24R1-SR 2.1 MP\"}, {\"status\": \"unaffected\", \"version\": \"24R1-SR 2.1 MP and later\"}]}], \"references\": [{\"url\": \"https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2025-24335/\", \"name\": \"Nokia Security Advisory\"}], \"x_generator\": {\"engine\": \"cveClient/1.0.15\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Nokia Single RAN baseband software versions earlier than 24R1-SR 2.1 MP contain a SOAP message input validation flaw, which in theory could potentially be used for causing resource exhaustion in the Single RAN baseband OAM service.\\n\\nNo practical exploit has been detected for this flaw. However, the issue has been corrected starting from release 24R1-SR 2.1 MP by adding sufficient input validation for received SOAP requests, effectively mitigating the reported issue.\"}], \"providerMetadata\": {\"orgId\": \"b48c3b8f-639e-4c16-8725-497bc411dad0\", \"shortName\": \"Nokia\", \"dateUpdated\": \"2025-07-02T08:35:46.346Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-24335\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-07-02T13:26:40.283Z\", \"dateReserved\": \"2025-01-20T05:33:25.524Z\", \"assignerOrgId\": \"b48c3b8f-639e-4c16-8725-497bc411dad0\", \"datePublished\": \"2025-07-02T08:35:46.346Z\", \"assignerShortName\": \"Nokia\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…