Open5GS MME versions <= 2.6.4 contains an assertion that can be remotely triggered via a sufficiently large ASN.1 packet over the S1AP interface. An attacker may repeatedly send such an oversized packet to cause the `ogs_sctp_recvmsg` routine to reach an unexpected network state and crash, leading to denial of service.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://cellularsecurity.org/ransacked |
|
History
Tue, 22 Apr 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Open5gs
Open5gs open5gs |
|
| CPEs | cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Open5gs
Open5gs open5gs |
Thu, 23 Jan 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-617 | |
| Metrics |
cvssV3_1
|
Wed, 22 Jan 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Open5GS MME versions <= 2.6.4 contains an assertion that can be remotely triggered via a sufficiently large ASN.1 packet over the S1AP interface. An attacker may repeatedly send such an oversized packet to cause the `ogs_sctp_recvmsg` routine to reach an unexpected network state and crash, leading to denial of service. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-01-22T00:00:00.000Z
Updated: 2025-01-23T21:32:04.376Z
Reserved: 2023-06-28T00:00:00.000Z
Link: CVE-2023-37013
Updated: 2025-01-23T21:31:58.859Z
Status : Analyzed
Published: 2025-01-22T15:15:10.883
Modified: 2025-04-22T17:15:29.427
Link: CVE-2023-37013
No data.