CVE-2023-37019

8.6 HIGH

📋 TL;DR

This vulnerability allows remote attackers to cause denial of service by sending specially crafted S1AP packets to Open5GS MME servers. Attackers can repeatedly crash the MME service by triggering an assertion failure via malformed ASN.1 packets. This affects all deployments running vulnerable Open5GS MME versions.

💻 Affected Systems

Products:
  • Open5GS MME
Versions: <= 2.6.4
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with S1AP interface exposed and accessible to attackers.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained MME crashes leading to complete cellular network service disruption in the affected area, preventing mobile devices from connecting to the network.

🟠

Likely Case

Intermittent MME service disruptions causing dropped connections and failed network attach procedures for mobile devices.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, allowing quick detection and recovery from crashes.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires knowledge of S1AP protocol and ability to craft malformed ASN.1 packets.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.6.5 or later

Vendor Advisory: https://github.com/open5gs/open5gs/releases

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Update Open5GS to version 2.6.5 or later. 3. Restart MME service. 4. Verify service is running correctly.

🔧 Temporary Workarounds

Network Segmentation

Linux

Restrict access to S1AP interface (port 36412) to trusted eNodeBs only using firewall rules.

iptables -A INPUT -p sctp --dport 36412 -s trusted_enodeb_ip -j ACCEPT
iptables -A INPUT -p sctp --dport 36412 -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit S1AP interface exposure.
  • Deploy intrusion detection systems to monitor for malformed S1AP packets.

🔍 How to Verify

Check if Vulnerable:

Check Open5GS version: open5gs-mmed --version. If version <= 2.6.4, system is vulnerable.

Check Version:

open5gs-mmed --version

Verify Fix Applied:

Verify version is >= 2.6.5 and monitor MME logs for stability after applying patch.

📡 Detection & Monitoring

Log Indicators:

  • MME process crashes
  • Assertion failures in logs
  • Repeated S1Setup Request failures

Network Indicators:

  • Unusual S1AP traffic patterns
  • S1Setup Request messages missing Supported TAs field

SIEM Query:

source="open5gs.log" AND ("assertion" OR "crash" OR "S1Setup")

🔗 References

📤 Share & Export