CVE-2023-37004

Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send an `Initial Context Setup Response` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service.
References
Link Resource
https://cellularsecurity.org/ransacked Third Party Advisory Exploit Technical Description
Configurations

Configuration 1 (hide)

cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*

History

22 Apr 2025, 17:14

Type Values Removed Values Added
First Time Open5gs
Open5gs open5gs
References () https://cellularsecurity.org/ransacked - () https://cellularsecurity.org/ransacked - Third Party Advisory, Exploit, Technical Description
CPE cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*

28 Jan 2025, 21:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
CWE CWE-617
Summary
  • (es) Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserción que se puede activar de forma remota a través de un paquete ASN.1 mal formado a través de la interfaz S1AP. Un atacante puede enviar un mensaje de "Respuesta de configuración de contexto inicial" sin el campo "MME_UE_S1AP_ID" requerido para bloquear repetidamente el MME, lo que da como resultado la denegación de servicio.

22 Jan 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-22 15:15

Updated : 2025-04-22 17:14


NVD link : CVE-2023-37004

Mitre link : CVE-2023-37004

CVE.ORG link : CVE-2023-37004


JSON object : View

Products Affected

open5gs

  • open5gs
CWE
CWE-617

Reachable Assertion