CVE-2023-37039

6.5 MEDIUM

📋 TL;DR

A null pointer dereference vulnerability in Magma's Mobile Management Entity (MME) allows network-adjacent attackers to crash the MME service by sending a malformed S1AP Initial UE Message packet missing the RRC Establishment Clause field. This affects Magma versions up to 1.8.0, potentially disrupting cellular network connectivity for users served by the affected MME.

💻 Affected Systems

Products:
  • Magma
Versions: <= 1.8.0
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with the MME component enabled and exposed to network-adjacent attackers.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service for cellular network subscribers served by the affected MME, disrupting voice, data, and SMS services until service is restored.

🟠

Likely Case

Service disruption affecting a subset of users or intermittent MME crashes requiring manual intervention to restart the service.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring allowing quick detection and recovery from crashes.

🌐 Internet-Facing: LOW - The vulnerability requires network-adjacent access to the MME's S1AP interface, which is typically not exposed to the public internet.
🏢 Internal Only: HIGH - Attackers with access to the internal cellular network infrastructure can exploit this to cause service disruption.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending a specifically crafted S1AP packet to the vulnerable MME interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.9 (commit 08472ba98b8321f802e95f5622fa90fec2dea486)

Vendor Advisory: https://cellularsecurity.org/ransacked

Restart Required: Yes

Instructions:

1. Update Magma to version 1.9 or later. 2. Apply commit 08472ba98b8321f802e95f5622fa90fec2dea486 if using source build. 3. Restart the MME service.

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict access to the MME's S1AP interface to only trusted network elements.

iptables -A INPUT -p sctp --dport 36412 -s trusted_ip_range -j ACCEPT
iptables -A INPUT -p sctp --dport 36412 -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit S1AP interface exposure
  • Deploy monitoring and alerting for MME service crashes with automated restart capabilities

🔍 How to Verify

Check if Vulnerable:

Check Magma version: if <= 1.8.0 and MME is running, system is vulnerable.

Check Version:

magma version | grep -i version

Verify Fix Applied:

Verify Magma version is >= 1.9 or includes commit 08472ba98b8321f802e95f5622fa90fec2dea486.

📡 Detection & Monitoring

Log Indicators:

  • MME service crash logs
  • Segmentation fault errors in MME logs
  • Unexpected MME restarts

Network Indicators:

  • Malformed S1AP packets to port 36412
  • Unusual S1AP traffic patterns

SIEM Query:

source="magma_logs" AND ("segmentation fault" OR "null pointer" OR "MME crash")

🔗 References

📤 Share & Export