Open5GS MME versions <= 2.6.4 contains an assertion that can be remotely triggered via a sufficiently large ASN.1 packet over the S1AP interface. An attacker may repeatedly send such an oversized packet to cause the `ogs_sctp_recvmsg` routine to reach an unexpected network state and crash, leading to denial of service.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://cellularsecurity.org/ransacked |
![]() ![]() |
History
Tue, 22 Apr 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Open5gs
Open5gs open5gs |
|
CPEs | cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:* | |
Vendors & Products |
Open5gs
Open5gs open5gs |
Thu, 23 Jan 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-617 | |
Metrics |
cvssV3_1
|
Wed, 22 Jan 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Open5GS MME versions <= 2.6.4 contains an assertion that can be remotely triggered via a sufficiently large ASN.1 packet over the S1AP interface. An attacker may repeatedly send such an oversized packet to cause the `ogs_sctp_recvmsg` routine to reach an unexpected network state and crash, leading to denial of service. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-01-22T00:00:00.000Z
Updated: 2025-01-23T21:32:04.376Z
Reserved: 2023-06-28T00:00:00.000Z
Link: CVE-2023-37013

Updated: 2025-01-23T21:31:58.859Z

Status : Analyzed
Published: 2025-01-22T15:15:10.883
Modified: 2025-04-22T17:15:29.427
Link: CVE-2023-37013

No data.