The Single RAN baseband OAM service is intended to run as an unprivileged service. However, it initially starts with root privileges and assigns certain capabilities before dropping to an unprivileged level. The capabilities retained from the root period are considered extensive after the privilege drop and, in theory, could potentially allow actions beyond the intended scope of the OAM service. These actions could include gaining root privileges, accessing root-owned files, modifying them as the file owner, and then returning them to root ownership. This issue has been corrected starting from release 24R1-SR 0.2 MP and later. Beginning with release 24R1-SR 0.2 MP, the OAM service software capabilities are restricted to the minimum necessary.
History

Wed, 02 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-250
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 02 Jul 2025 08:45:00 +0000

Type Values Removed Values Added
Description The Single RAN baseband OAM service is intended to run as an unprivileged service. However, it initially starts with root privileges and assigns certain capabilities before dropping to an unprivileged level. The capabilities retained from the root period are considered extensive after the privilege drop and, in theory, could potentially allow actions beyond the intended scope of the OAM service. These actions could include gaining root privileges, accessing root-owned files, modifying them as the file owner, and then returning them to root ownership. This issue has been corrected starting from release 24R1-SR 0.2 MP and later. Beginning with release 24R1-SR 0.2 MP, the OAM service software capabilities are restricted to the minimum necessary.
Title Nokia Single RAN baseband OAM service extensive capabilities
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Nokia

Published: 2025-07-02T08:30:19.565Z

Updated: 2025-07-02T14:36:32.449Z

Reserved: 2025-01-20T05:33:25.523Z

Link: CVE-2025-24331

cve-icon Vulnrichment

Updated: 2025-07-02T14:35:00.460Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-02T09:15:24.597

Modified: 2025-07-03T15:13:53.147

Link: CVE-2025-24331

cve-icon Redhat

No data.