A vulnerability classified as problematic was found in Open5GS up to 2.7.2. Affected by this vulnerability is the function amf_nsmf_pdusession_handle_update_sm_context of the file src/amf/nsmf-handler.c of the component AMF. The manipulation leads to denial of service. The attack can be launched remotely. This vulnerability allows a single UE to crash the AMF, resulting in the complete loss of mobility and session management services and causing a network-wide outage. All registered UEs will lose connectivity, and new registrations will be blocked until the AMF is restarted, leading to a high availability impact. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.
The product does not release or incorrectly releases a resource before it is made available for re-use.
Link | Tags |
---|---|
https://vuldb.com/?id.298513 | vdb entry technical description exploit |
https://vuldb.com/?ctiid.298513 | signature permissions required |
https://vuldb.com/?submit.506038 | third party advisory |
https://github.com/guoweifk/BugReport/blob/main/Open5GS%20AMF%20Denial%20of%20Service%20via%20PDU%20Session%20ID%20Conflict | exploit |
https://github.com/open5gs/open5gs/pull/3711 | issue tracking |