Arrow right
Addressing security threats in open RAN

Addressing security threats in open RAN

Strengthening O-RAN software security via continuous Software Composition Analysis

During a recent study done at the i14y Lab, Software Composition Analysis (SCA) was used to address security threats introduced to open RAN with open-source software components. It employed a continuous scanning method using GitHub Actions. The study was done by Tsvetan Kolev from TU Berlin, inspired and supervised by Dr. Kashyap Thimmaraju, postdoctoral researcher at Prof. Dr. Jean-Pierre Seifert’s chair for Security in Telecommunication. 

a blurry shot of the interior of the i14y Lab Server room.

Open-source software supports the key tenets of open RAN, namely openness and interoperability, but comes with its own risks. As most projects will include a complex list of dependencies, an automatic auditing process is necessary to provide a holistic overview of the software components that are used. This is where SCA can be a valuable methodology. SCA tools can detect open-source components, find known vulnerabilities in them and ensure compliance with licensing requirements. This provides a comprehensive view of potential risks which the dependencies can introduce into a project.

 

Software Composition Analysis is a security practice that focuses on the identification and management of third-party and open-source dependencies used in a software. The O-RAN Alliance itself recommends “to have Software Composition Analysis tooling to automatically scan and identify all open-source components, version(s) in use, all package dependencies, libraries, and create an accurate bill of materials (BOM), checks for policy and license compliance, security risks, protect against threats to intellectual property (IP) and version updates” in their specification "O-RAN Study on Security for Near Real Time RIC and xApps 5.00" .

 

Tsvetan Kolev’s approach presents a continuous scanning method, developed with the assistance of GitHub Actions, designed to help developers identify and manage risks in the code of the O-RAN software. For this, three publicly available SCA tools grype, snyk, and trivy were used to continuously audit the software and report known vulnerabilities within the code of two open-source Near Real-Time RAN Intelligent Controllers ( Additionally, they validated the methodology through an additional test involving a third Near-RT RIC.

The solution has served to identify numerous potential vulnerabilities in the security of the Near-RT RICs, enhancing the safety and robustness of the code and supporting the O-RAN Alliance’s vision of creating a resilient and reliable O-RAN ecosystem. And while the study was done on Near-RT RIC , it can be adapted to other components of the open RAN architecture that will be delivered as open source apart from the RIC, such as the protocol stack, the PHY layer processing and the virtualization platform.

 

And while continuous SCA scanning and regular updating of software components is essential for maintaining open RAN software security, future research could investigate expanding this mechanism to incorporate ways to remediate the vulnerabilities identified by the SCA tools.

Tsvetan Kolev originally hails from Bulgaria and currently pursues his B.Sc. at the TU Berlin. He is keenly interested in cybersecurity and the challenge of staying ahead of digital threats.

Dr. Kashyap Thimmaraju is a senior researcher at the TU Berlin, where his research involves the security of Open-Radio Access Networks and Human Performance in Cybersecurity Operations.

i14y Lab Newsletter

Subscribe to the i14y Lab newsletter to get your monthly update on what’s going on in the lab, upcoming events, and other network disaggregation news.