CVE-2024-24426

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to cause denial of service in OpenAirInterface Magma and OAI EPC Federation by sending specially crafted NGAP packets. The reachable assertions in the NGAP_FIND_PROTOCOLIE_BY_ID function can crash the service, affecting telecommunications infrastructure using these specific versions.

💻 Affected Systems

Products:
  • OpenAirInterface Magma
  • OAI EPC Federation
Versions: Magma v1.8.0, OAI EPC Federation v1.2.0
Operating Systems: Linux-based systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with NGAP interface enabled and exposed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of cellular network functions, preventing user connectivity and network operations.

🟠

Likely Case

Service crashes requiring manual restart, causing temporary service outages.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, allowing quick detection and recovery.

🌐 Internet-Facing: MEDIUM - Requires NGAP packet access which may be exposed in some deployments.
🏢 Internal Only: HIGH - Internal attackers or compromised systems can easily exploit this.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Crafting NGAP packets requires protocol knowledge but tools exist.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check latest releases on GitHub repositories

Vendor Advisory: https://github.com/OPENAIRINTERFACE/openair-epc-fed and https://github.com/magma/magma

Restart Required: Yes

Instructions:

1. Check current version. 2. Update to latest release from official repositories. 3. Restart affected services. 4. Verify fix.

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict access to NGAP interfaces using firewall rules

iptables -A INPUT -p sctp --dport 38412 -j DROP
ufw deny 38412

Rate Limiting

linux

Limit NGAP packet rate to reduce DoS impact

iptables -A INPUT -p sctp --dport 38412 -m limit --limit 10/second -j ACCEPT
iptables -A INPUT -p sctp --dport 38412 -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to NGAP interfaces
  • Deploy intrusion detection systems monitoring for abnormal NGAP traffic

🔍 How to Verify

Check if Vulnerable:

Check version numbers: Magma v1.8.0 or OAI EPC Federation v1.2.0

Check Version:

magma version or check package manager for installed version

Verify Fix Applied:

Verify version is updated beyond affected versions and test with normal NGAP traffic

📡 Detection & Monitoring

Log Indicators:

  • Service crashes
  • Assertion failures in logs
  • NGAP protocol errors

Network Indicators:

  • Abnormal NGAP packet patterns
  • High rate of NGAP requests
  • SCTP port 38412 anomalies

SIEM Query:

source="magma.log" AND ("assertion" OR "crash" OR "NGAP")

🔗 References

📤 Share & Export