A reachable assertion in the ogs_nas_emm_decode function of Open5GS v2.7.0 allows attackers to cause a Denial of Service (DoS) via a crafted NAS packet with a zero-length EMM message length.
References
Link | Resource |
---|---|
https://cellularsecurity.org/ransacked | Third Party Advisory Exploit Technical Description |
https://open5gs.org/ | Product |
Configurations
History
22 Apr 2025, 17:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://cellularsecurity.org/ransacked - Third Party Advisory, Exploit, Technical Description | |
References | () https://open5gs.org/ - Product | |
First Time |
Open5gs open5gs
Open5gs |
|
CPE | cpe:2.3:a:open5gs:open5gs:2.7.0:*:*:*:*:*:*:* |
03 Dec 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | CWE-78 |
18 Nov 2024, 17:11
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
15 Nov 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-15 19:15
Updated : 2025-04-22 17:26
NVD link : CVE-2024-24431
Mitre link : CVE-2024-24431
CVE.ORG link : CVE-2024-24431
JSON object : View
Products Affected
open5gs
- open5gs
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')