CVE-2024-24423

7.5 HIGH

📋 TL;DR

A buffer overflow vulnerability in Magma's decode_esm_message_container function allows attackers to cause Denial of Service via crafted NAS packets. This affects all systems running Magma <=1.8.0, particularly cellular network infrastructure deployments.

💻 Affected Systems

Products:
  • Linux Foundation Magma
Versions: <= 1.8.0
Operating Systems: Linux-based systems running Magma
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of Magma components, potentially affecting cellular network availability for connected devices.

🟠

Likely Case

DoS against specific Magma instances causing localized service degradation.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring.

🌐 Internet-Facing: MEDIUM - Requires network access to Magma services, but many deployments have internet-facing components.
🏢 Internal Only: HIGH - Internal attackers with network access can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to send crafted NAS packets to vulnerable Magma instances.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.9 (commit 08472ba98b8321f802e95f5622fa90fec2dea486)

Vendor Advisory: https://cellularsecurity.org/ransacked

Restart Required: No

Instructions:

1. Update Magma to version 1.9 or later. 2. Apply commit 08472ba98b8321f802e95f5622fa90fec2dea486 if using custom builds. 3. Verify the fix by checking the updated EsmMessageContainer.cpp file.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Magma services to trusted sources only.

iptables -A INPUT -p tcp --dport <magma_port> -s <trusted_network> -j ACCEPT
iptables -A INPUT -p tcp --dport <magma_port> -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can send packets to Magma services.
  • Deploy intrusion detection systems to monitor for anomalous NAS packet patterns.

🔍 How to Verify

Check if Vulnerable:

Check Magma version: magma version | grep 'Magma version'

Check Version:

magma version

Verify Fix Applied:

Verify version is >=1.9 or check EsmMessageContainer.cpp contains the fix commit hash.

📡 Detection & Monitoring

Log Indicators:

  • Magma service crashes
  • Abnormal termination of decode_esm_message_container processes
  • Memory allocation errors in Magma logs

Network Indicators:

  • Unusual NAS packet patterns
  • High volume of malformed packets to Magma ports

SIEM Query:

source="magma.log" AND ("segmentation fault" OR "buffer overflow" OR "EsmMessageContainer")

🔗 References

📤 Share & Export