CVE-2023-37019

Open5GS MME versions <= 2.6.4 contains an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send an `S1Setup Request` message missing a required `Supported TAs` field to repeatedly crash the MME, resulting in denial of service.
References
Link Resource
https://cellularsecurity.org/ransacked Third Party Advisory Exploit Technical Description
Configurations

Configuration 1 (hide)

cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*

History

22 Apr 2025, 17:15

Type Values Removed Values Added
CPE cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*
First Time Open5gs
Open5gs open5gs
References () https://cellularsecurity.org/ransacked - () https://cellularsecurity.org/ransacked - Third Party Advisory, Exploit, Technical Description

06 Feb 2025, 22:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.6
CWE CWE-617
Summary
  • (es) Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserción que se puede activar de forma remota a través de un paquete ASN.1 mal formado a través de la interfaz S1AP. Un atacante puede enviar un mensaje de "Solicitud de configuración de S1" sin el campo "TA compatibles" requerido para bloquear repetidamente el MME, lo que da como resultado la denegación de servicio.

22 Jan 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-22 15:15

Updated : 2025-04-22 17:15


NVD link : CVE-2023-37019

Mitre link : CVE-2023-37019

CVE.ORG link : CVE-2023-37019


JSON object : View

Products Affected

open5gs

  • open5gs
CWE
CWE-617

Reachable Assertion