CVE-2024-24451
Published: 21 January 2025
Description
A stack overflow in the sctp_server::sctp_receiver_thread component of OpenAirInterface CN5G AMF (oai-cn5g-amf) up to v2.0.0 allows attackers to cause a Denial of Service (DoS) by repeatedly establishing SCTP connections with the N2 interface.
Security Summary
CVE-2024-24451 is a stack overflow vulnerability (CWE-120) in the sctp_server::sctp_receiver_thread component of OpenAirInterface CN5G AMF (oai-cn5g-amf) up to version v2.0.0. Published on 2025-01-21, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating high-impact availability disruption with network accessibility and low attack complexity.
Unauthenticated attackers can exploit the vulnerability remotely by repeatedly establishing SCTP connections to the N2 interface, triggering the stack overflow and causing a Denial of Service (DoS) that crashes the affected component.
Mitigation details are available in advisories from OpenAirInterface at http://openairinterface.com and the Cellular Security Research Group at https://cellularsecurity.org/ransacked.
Details
- CWE(s)