Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `UE Context Release Complete` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://cellularsecurity.org/ransacked |
|
History
Tue, 22 Apr 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Open5gs
Open5gs open5gs |
|
| CPEs | cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Open5gs
Open5gs open5gs |
Thu, 06 Feb 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-617 | |
| Metrics |
cvssV3_1
|
Wed, 22 Jan 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `UE Context Release Complete` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-01-22T00:00:00.000Z
Updated: 2025-02-06T21:31:21.786Z
Reserved: 2023-06-28T00:00:00.000Z
Link: CVE-2023-37020
Updated: 2025-01-22T16:52:44.299Z
Status : Analyzed
Published: 2025-01-22T15:15:11.613
Modified: 2025-04-22T17:15:07.263
Link: CVE-2023-37020
No data.