CVE-2024-24428

7.5 HIGH

📋 TL;DR

A reachable assertion vulnerability in Open5GS's 5GMM decoding function allows attackers to cause denial of service by sending specially crafted NGAP packets. This affects Open5GS deployments up to version 2.6.4, potentially disrupting 5G core network services.

💻 Affected Systems

Products:
  • Open5GS
Versions: <= 2.6.4
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using vulnerable Open5GS versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of the Open5GS core network component, causing 5G service outages for all connected devices.

🟠

Likely Case

Targeted DoS attacks against specific Open5GS instances, causing temporary service interruptions until the process restarts.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, allowing quick detection and recovery.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting NGAP packets but no authentication is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.6.5 or later

Vendor Advisory: https://github.com/open5gs/open5gs/releases

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Update Open5GS to version 2.6.5 or later. 3. Restart Open5GS services. 4. Verify service functionality.

🔧 Temporary Workarounds

Network Filtering

all

Implement network ACLs to restrict NGAP packet sources to trusted entities only.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Open5GS from untrusted networks.
  • Deploy intrusion detection systems to monitor for anomalous NGAP traffic patterns.

🔍 How to Verify

Check if Vulnerable:

Check Open5GS version with: open5gs --version

Check Version:

open5gs --version

Verify Fix Applied:

Confirm version is 2.6.5 or later and monitor for assertion failures in logs.

📡 Detection & Monitoring

Log Indicators:

  • Assertion failures in Open5GS logs
  • Process crashes with oai_nas_5gmm_decode references

Network Indicators:

  • Unusual NGAP packet patterns
  • Spike in malformed 5G signaling traffic

SIEM Query:

source="open5gs.log" AND ("assertion" OR "oai_nas_5gmm_decode")

🔗 References

📤 Share & Export