Open5GS MME versions <= 2.6.4 contain a buffer overflow in the ASN.1 deserialization function of the S1AP handler. This buffer overflow causes type confusion in decoded fields, leading to invalid parsing and freeing of memory. An attacker may use this to crash an MME or potentially execute code in certain circumstances.
References
Link | Resource |
---|---|
https://cellularsecurity.org/ransacked | Third Party Advisory Exploit Technical Description |
Configurations
History
22 Apr 2025, 17:14
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:* | |
First Time |
Open5gs
Open5gs open5gs |
|
References | () https://cellularsecurity.org/ransacked - Third Party Advisory, Exploit, Technical Description |
28 Jan 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CWE | CWE-617 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
22 Jan 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-22 15:15
Updated : 2025-04-22 17:14
NVD link : CVE-2023-37008
Mitre link : CVE-2023-37008
CVE.ORG link : CVE-2023-37008
JSON object : View
Products Affected
open5gs
- open5gs
CWE
CWE-617
Reachable Assertion