Total
23 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-40130 | 1 Open5gs | 1 Open5gs | 2024-08-21 | N/A | 9.8 CRITICAL |
open5gs v2.6.4 is vulnerable to Buffer Overflow. via /lib/core/abts.c. | |||||
CVE-2024-40129 | 1 Open5gs | 1 Open5gs | 2024-08-21 | N/A | 9.8 CRITICAL |
Open5GS v2.6.4 is vulnerable to Buffer Overflow. via /lib/pfcp/context.c. | |||||
CVE-2023-50019 | 1 Open5gs | 1 Open5gs | 2024-02-28 | N/A | 5.9 MEDIUM |
An issue was discovered in open5gs v2.6.6. InitialUEMessage, Registration request sent at a specific time can crash AMF due to incorrect error handling of Nudm_UECM_Registration response. | |||||
CVE-2023-50020 | 1 Open5gs | 1 Open5gs | 2024-02-28 | N/A | 7.5 HIGH |
An issue was discovered in open5gs v2.6.6. SIGPIPE can be used to crash AMF. | |||||
CVE-2023-4882 | 1 Open5gs | 1 Open5gs | 2024-02-28 | N/A | 7.5 HIGH |
DOS vulnerability that could allow an attacker to register a new VNF (Virtual Network Function) value. This action could trigger the args_assets() function defined in the arg-log.php file, which would then execute the args-abort.c file, causing the service to crash. | |||||
CVE-2023-4884 | 1 Open5gs | 1 Open5gs | 2024-02-28 | N/A | 7.5 HIGH |
An attacker could send an HTTP request to an Open5GS endpoint and retrieve the information stored on the device due to the lack of Authentication. | |||||
CVE-2023-4885 | 1 Open5gs | 1 Open5gs | 2024-02-28 | N/A | 5.9 MEDIUM |
Man in the Middle vulnerability, which could allow an attacker to intercept VNF (Virtual Network Function) communications resulting in the exposure of sensitive information. | |||||
CVE-2023-4883 | 1 Open5gs | 1 Open5gs | 2024-02-28 | N/A | 7.5 HIGH |
Invalid pointer release vulnerability. Exploitation of this vulnerability could allow an attacker to interrupt the correct operation of the service by sending a specially crafted json string to the VNF (Virtual Network Function), and triggering the ogs_sbi_message_free function, which could cause a service outage. | |||||
CVE-2023-23846 | 1 Open5gs | 1 Open5gs | 2024-02-28 | N/A | 7.5 HIGH |
Due to insufficient length validation in the Open5GS GTP library versions prior to versions 2.4.13 and 2.5.7, when parsing extension headers in GPRS tunneling protocol (GPTv1-U) messages, a protocol payload with any extension header length set to zero causes an infinite loop. The affected process becomes immediately unresponsive, resulting in denial of service and excessive resource consumption. CVSS3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C | |||||
CVE-2022-3354 | 1 Open5gs | 1 Open5gs | 2024-02-28 | N/A | 7.5 HIGH |
A vulnerability has been found in Open5GS up to 2.4.10 and classified as problematic. This vulnerability affects unknown code in the library lib/core/ogs-tlv-msg.c of the component UDP Packet Handler. The manipulation leads to denial of service. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-209686 is the identifier assigned to this vulnerability. | |||||
CVE-2022-40890 | 1 Open5gs | 1 Open5gs | 2024-02-28 | N/A | 7.5 HIGH |
A vulnerability in /src/amf/amf-context.c in Open5GS 2.4.10 and earlier leads to AMF denial of service. | |||||
CVE-2022-43221 | 1 Open5gs | 1 Open5gs | 2024-02-28 | N/A | 7.5 HIGH |
open5gs v2.4.11 was discovered to contain a memory leak in the component src/upf/pfcp-path.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted PFCP packet. | |||||
CVE-2022-39063 | 1 Open5gs | 1 Open5gs | 2024-02-28 | N/A | 7.5 HIGH |
When Open5GS UPF receives a PFCP Session Establishment Request, it stores related values for building the PFCP Session Establishment Response. Once UPF receives a request, it gets the f_teid_len from incoming message, and then uses it to copy data from incoming message to struct f_teid without checking the maximum length. If the pdi.local_f_teid.len exceeds the maximum length of the struct of f_teid, the memcpy() overwrites the fields (e.g., f_teid_len) after f_teid in the pdr struct. After parsing the request, the UPF starts to build a response. The f_teid_len with its overwritten value is used as a length for memcpy(). A segmentation fault occurs, as a result of a memcpy(), if this overwritten value is large enough. | |||||
CVE-2022-43223 | 1 Open5gs | 1 Open5gs | 2024-02-28 | N/A | 7.5 HIGH |
open5gs v2.4.11 was discovered to contain a memory leak in the component ngap-handler.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted UE attachment. | |||||
CVE-2022-43222 | 1 Open5gs | 1 Open5gs | 2024-02-28 | N/A | 7.5 HIGH |
open5gs v2.4.11 was discovered to contain a memory leak in the component src/smf/pfcp-path.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted PFCP packet. | |||||
CVE-2022-3299 | 1 Open5gs | 1 Open5gs | 2024-02-28 | N/A | 6.5 MEDIUM |
A vulnerability was found in Open5GS up to 2.4.10. It has been declared as problematic. Affected by this vulnerability is an unknown functionality in the library lib/sbi/client.c of the component AMF. The manipulation leads to denial of service. The attack can be launched remotely. The name of the patch is 724fa568435dae45ef0c3a48b2aabde052afae88. It is recommended to apply a patch to fix this issue. The identifier VDB-209545 was assigned to this vulnerability. | |||||
CVE-2021-44108 | 1 Open5gs | 1 Open5gs | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
A null pointer dereference in src/amf/namf-handler.c in Open5GS 2.3.6 and earlier allows remote attackers to Denial of Service via a crafted sbi request to amf. | |||||
CVE-2021-44109 | 1 Open5gs | 1 Open5gs | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
A buffer overflow in lib/sbi/message.c in Open5GS 2.3.6 and earlier allows remote attackers to Denial of Service via a crafted sbi request. | |||||
CVE-2021-44081 | 1 Open5gs | 1 Open5gs | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
A buffer overflow vulnerability exists in the AMF of open5gs 2.1.4. When the length of MSIN in Supi exceeds 24 characters, it leads to AMF denial of service. | |||||
CVE-2021-41794 | 1 Open5gs | 1 Open5gs | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
ogs_fqdn_parse in Open5GS 1.0.0 through 2.3.3 inappropriately trusts a client-supplied length value, leading to a buffer overflow. The attacker can send a PFCP Session Establishment Request with "internet" as the PDI Network Instance. The first character is interpreted as a length value to be used in a memcpy call. The destination buffer is only 100 bytes long on the stack. Then, 'i' gets interpreted as 105 bytes to copy from the source buffer to the destination buffer. |