Open5GS MME version <= 2.6.4 contains an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `UE Context Modification Failure` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service.
References
Link | Resource |
---|---|
https://cellularsecurity.org/ransacked | Third Party Advisory Exploit Technical Description |
Configurations
History
22 Apr 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:* | |
First Time |
Open5gs open5gs
Open5gs |
|
References | () https://cellularsecurity.org/ransacked - Third Party Advisory, Exploit, Technical Description |
06 Feb 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.6 |
CWE | CWE-617 |
22 Jan 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-22 15:15
Updated : 2025-04-22 17:15
NVD link : CVE-2023-37021
Mitre link : CVE-2023-37021
CVE.ORG link : CVE-2023-37021
JSON object : View
Products Affected
open5gs
- open5gs
CWE
CWE-617
Reachable Assertion