CVE-2023-37012

Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send an `Initial UE Message` message missing a required `PLMN Identity` field to repeatedly crash the MME, resulting in denial of service.
References
Link Resource
https://cellularsecurity.org/ransacked Third Party Advisory Exploit Technical Description
Configurations

Configuration 1 (hide)

cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*

History

22 Apr 2025, 17:13

Type Values Removed Values Added
First Time Open5gs
Open5gs open5gs
References () https://cellularsecurity.org/ransacked - () https://cellularsecurity.org/ransacked - Third Party Advisory, Exploit, Technical Description
CPE cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*

27 Jan 2025, 21:15

Type Values Removed Values Added
CWE CWE-617
Summary
  • (es) Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserción que se puede activar de forma remota a través de un paquete ASN.1 mal formado a través de la interfaz S1AP. Un atacante puede enviar un mensaje de "Mensaje inicial de UE" sin el campo "Identidad PLMN" requerido para bloquear repetidamente el MME, lo que da como resultado la denegación de servicio.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3

22 Jan 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-22 15:15

Updated : 2025-04-22 17:13


NVD link : CVE-2023-37012

Mitre link : CVE-2023-37012

CVE.ORG link : CVE-2023-37012


JSON object : View

Products Affected

open5gs

  • open5gs
CWE
CWE-617

Reachable Assertion