Cyber Posture

CVE-2023-37023

HighPublic PoC

Published: 22 January 2025

Published
22 January 2025
Modified
22 April 2025
KEV Added
Patch
CVSS Score 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
EPSS Score 0.0031 53.7th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Open5GS MME versions <= 2.6.4 contain a reachable assertion in the `Uplink NAS Transport` packet handler. A packet missing its `MME_UE_S1AP_ID` field causes Open5gs to crash; an attacker may repeatedly send such packets to cause denial of service.

Security Summary

CVE-2023-37023 is a reachable assertion vulnerability (CWE-617) affecting Open5GS Mobility Management Entity (MME) versions up to and including 2.6.4. The issue resides in the Uplink NAS Transport packet handler, where a packet missing its MME_UE_S1AP_ID field triggers an assertion failure, causing the Open5GS MME to crash. This flaw was published on 2025-01-22 and carries a CVSS v3.1 base score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H), indicating high severity due to its potential for significant availability disruption.

Any unauthenticated attacker with network access to the affected Open5GS MME can exploit this vulnerability by sending specially crafted Uplink NAS Transport packets lacking the required MME_UE_S1AP_ID field. A single such packet crashes the service, and repeated transmissions enable a denial-of-service condition, rendering the MME unavailable. The attack requires low complexity, no user interaction, and exploits a scope change to amplify impact across the system.

Mitigation details and patches are outlined in the advisory available at https://cellularsecurity.org/ransacked. Security practitioners should consult this reference for upgrade guidance to versions beyond 2.6.4 and any interim workarounds.

Details

CWE(s)
CWE-617

Affected Products

open5gs
open5gs
≤ 2.6.4

References