CVE-2024-34235

Open5GS MME versions <= 2.6.4 contains an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send an `Initial UE Message` missing a required `NAS_PDU` field to repeatedly crash the MME, resulting in denial of service.
References
Link Resource
https://cellularsecurity.org/ransacked Third Party Advisory Exploit Technical Description
Configurations

Configuration 1 (hide)

cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*

History

22 Apr 2025, 17:22

Type Values Removed Values Added
First Time Open5gs open5gs
Open5gs
References () https://cellularsecurity.org/ransacked - () https://cellularsecurity.org/ransacked - Third Party Advisory, Exploit, Technical Description
CPE cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*

06 Feb 2025, 22:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.6
Summary
  • (es) Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una afirmación que se puede activar de forma remota a través de un paquete ASN.1 mal formado a través de la interfaz S1AP. Un atacante puede enviar un «Mensaje inicial de UE» sin un campo «NAS_PDU» obligatorio para bloquear repetidamente el MME, lo que da como resultado la denegación de servicio.
CWE CWE-617

22 Jan 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-22 15:15

Updated : 2025-04-22 17:22


NVD link : CVE-2024-34235

Mitre link : CVE-2024-34235

CVE.ORG link : CVE-2024-34235


JSON object : View

Products Affected

open5gs

  • open5gs
CWE
CWE-617

Reachable Assertion