- Description
- The Single RAN baseband OAM service is intended to run as an unprivileged service. However, it initially starts with root privileges and assigns certain capabilities before dropping to an unprivileged level. The capabilities retained from the root period are considered extensive after the privilege drop and, in theory, could potentially allow actions beyond the intended scope of the OAM service. These actions could include gaining root privileges, accessing root-owned files, modifying them as the file owner, and then returning them to root ownership. This issue has been corrected starting from release 24R1-SR 0.2 MP and later. Beginning with release 24R1-SR 0.2 MP, the OAM service software capabilities are restricted to the minimum necessary.
- Source
- b48c3b8f-639e-4c16-8725-497bc411dad0
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 6.4
- Impact score
- 5.9
- Exploitability score
- 0.5
- Vector string
- CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- MEDIUM
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-250
- Hype score
- Not currently trending
CVE-2025-24331 Privilege Escalation Vulnerability in Single RAN Baseband OAM Service https://t.co/tjVtgwWMUP
@VulmonFeeds
2 Jul 2025
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-24331 The Single RAN baseband OAM service is intended to run as an unprivileged service. However, it initially starts with root privileges and assigns certain capabilities … https://t.co/Jkodr2eSuI
@CVEnew
2 Jul 2025
431 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes