CVE-2023-37017

Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send an `S1Setup Request` message missing a required `Global eNB ID` field to repeatedly crash the MME, resulting in denial of service.
References
Link Resource
https://cellularsecurity.org/ransacked Third Party Advisory Exploit Technical Description
Configurations

Configuration 1 (hide)

cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*

History

22 Apr 2025, 17:15

Type Values Removed Values Added
CPE cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*
References () https://cellularsecurity.org/ransacked - () https://cellularsecurity.org/ransacked - Third Party Advisory, Exploit, Technical Description
First Time Open5gs open5gs
Open5gs

06 Feb 2025, 22:15

Type Values Removed Values Added
CWE CWE-617
Summary
  • (es) Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserción que se puede activar de forma remota a través de un paquete ASN.1 mal formado a través de la interfaz S1AP. Un atacante puede enviar un mensaje de "Solicitud de configuración de S1" sin el campo "ID de eNB global" requerido para bloquear repetidamente el MME, lo que da como resultado la denegación de servicio.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.6

22 Jan 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-22 15:15

Updated : 2025-04-22 17:15


NVD link : CVE-2023-37017

Mitre link : CVE-2023-37017

CVE.ORG link : CVE-2023-37017


JSON object : View

Products Affected

open5gs

  • open5gs
CWE
CWE-617

Reachable Assertion