A reachable assertion in the ogs_nas_emm_decode function of Open5GS v2.7.0 allows attackers to cause a Denial of Service (DoS) via a crafted NAS packet with a zero-length EMM message length.
References
| Link | Resource |
|---|---|
| https://cellularsecurity.org/ransacked | Third Party Advisory Exploit Technical Description |
| https://open5gs.org/ | Product |
Configurations
History
22 Apr 2025, 17:26
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:open5gs:open5gs:2.7.0:*:*:*:*:*:*:* | |
| References | () https://cellularsecurity.org/ransacked - Third Party Advisory, Exploit, Technical Description | |
| References | () https://open5gs.org/ - Product | |
| First Time |
Open5gs open5gs
Open5gs |
03 Dec 2024, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| CWE | CWE-78 |
18 Nov 2024, 17:11
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
15 Nov 2024, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-11-15 19:15
Updated : 2025-04-22 17:26
NVD link : CVE-2024-24431
Mitre link : CVE-2024-24431
CVE.ORG link : CVE-2024-24431
JSON object : View
Products Affected
open5gs
- open5gs
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
