CVE-2023-37035
📋 TL;DR
A null pointer dereference vulnerability in Magma's Mobile Management Entity (MME) allows network-adjacent attackers to crash the MME service by sending a malformed S1AP S1Setup Request packet missing the Global eNB ID field. This causes denial of service for cellular network users. Organizations running Magma core networks with versions up to 1.8.0 are affected.
💻 Affected Systems
- Magma Core Network
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete MME service crash leading to cellular service outage for all users in the affected area, requiring manual restart of the MME component.
Likely Case
Service disruption affecting cellular connectivity for users served by the crashed MME instance until automatic or manual recovery occurs.
If Mitigated
Minimal impact with proper network segmentation and monitoring allowing quick detection and recovery from the crash.
🎯 Exploit Status
Exploitation requires sending a specifically crafted S1AP packet but does not require authentication. Attackers need network access to the MME's S1 interface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.9.0 (commit 08472ba98b8321f802e95f5622fa90fec2dea486)
Vendor Advisory: https://cellularsecurity.org/ransacked
Restart Required: Yes
Instructions:
1. Update Magma to version 1.9.0 or later. 2. Apply commit 08472ba98b8321f802e95f5622fa90fec2dea486 if using source. 3. Restart the MME service after patching.
🔧 Temporary Workarounds
Network Segmentation
linuxRestrict access to the MME's S1 interface to only trusted eNodeBs using firewall rules.
iptables -A INPUT -p sctp --dport 36412 -s <trusted_eNB_IP> -j ACCEPT
iptables -A INPUT -p sctp --dport 36412 -j DROP
🧯 If You Can't Patch
- Implement strict network access controls to limit S1 interface access to authorized eNodeBs only.
- Deploy monitoring and alerting for MME service crashes with automated restart capabilities.
🔍 How to Verify
Check if Vulnerable:
Check Magma version: if <= 1.8.0, the system is vulnerable. Review MME logs for crashes after receiving S1Setup Request packets.
Check Version:
magma version | grep -i version
Verify Fix Applied:
Verify Magma version is >= 1.9.0 or includes commit 08472ba98b8321f802e95f5622fa90fec2dea486. Test with valid S1Setup Request packets.
📡 Detection & Monitoring
Log Indicators:
- MME service crashes
- Null pointer dereference errors in MME logs
- Unexpected termination of mme process
Network Indicators:
- Malformed S1AP S1Setup Request packets missing Global eNB ID field
- Unusual SCTP traffic to MME port 36412
SIEM Query:
source="mme.log" AND ("null pointer" OR "segmentation fault" OR "crash")