A vulnerability was found in Open5GS up to 2.7.2. It has been declared as problematic. Affected by this vulnerability is the function gmm_state_authentication of the file src/amf/gmm-sm.c of the component AMF. The manipulation leads to denial of service. The attack can be launched remotely. This vulnerability allows a single UE to crash the AMF, resulting in the complete loss of mobility and session management services and causing a network-wide outage. All registered UEs will lose connectivity, and new registrations will be blocked until the AMF is restarted, leading to a high availability impact. The exploit has been disclosed to the public and may be used. The patch is named e31e9965f00d9c744a7f728497cb4f3e97744ee8. It is recommended to apply a patch to fix this issue.
The product does not release or incorrectly releases a resource before it is made available for re-use.
Link | Tags |
---|---|
https://vuldb.com/?id.298411 | vdb entry third party advisory technical description exploit |
https://vuldb.com/?ctiid.298411 | permissions required signature |
https://vuldb.com/?submit.505952 | third party advisory |
https://github.com/open5gs/open5gs/issues/3707 | issue tracking exploit |
https://github.com/open5gs/open5gs/issues/3707#issuecomment-2639620554 | issue tracking exploit |
https://github.com/open5gs/open5gs/issues/3707#issue-2833194192 | issue tracking exploit |
https://github.com/open5gs/open5gs/commit/e31e9965f00d9c744a7f728497cb4f3e97744ee8 | patch |