CVE-2024-24432

5.3 MEDIUM

📋 TL;DR

This vulnerability in Open5GS allows attackers to trigger a reachable assertion in the ogs_kdf_hash_mme function by sending a specially crafted NAS packet, causing a Denial of Service (DoS) crash. It affects Open5GS deployments handling cellular network signaling traffic. The impact is limited to service disruption rather than data compromise.

💻 Affected Systems

Products:
  • Open5GS
Versions: <= 2.6.4
Operating Systems: Linux, BSD-based systems where Open5GS runs
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with the MME component enabled and processing NAS signaling messages.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage of the Open5GS MME component, disrupting cellular network connectivity for all users served by that instance.

🟠

Likely Case

Service disruption causing dropped connections and failed authentication attempts for cellular devices attempting to attach to the network.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring that detects and blocks malicious NAS packets before reaching vulnerable systems.

🌐 Internet-Facing: MEDIUM - While the vulnerability requires sending NAS packets, internet-facing MME interfaces could be targeted if improperly exposed.
🏢 Internal Only: HIGH - Internal network attackers or compromised devices could exploit this to disrupt cellular network operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending a crafted NAS packet to the vulnerable function, which is relatively straightforward for attackers with network access to the MME interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.6.5 or later

Vendor Advisory: https://github.com/open5gs/open5gs/releases

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Stop Open5GS services. 3. Update to Open5GS 2.6.5 or newer using package manager or source compilation. 4. Restart Open5GS services. 5. Verify service functionality.

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict access to Open5GS MME NAS signaling interfaces to trusted network segments only

iptables -A INPUT -p sctp --dport 36412 -s trusted_network -j ACCEPT
iptables -A INPUT -p sctp --dport 36412 -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit which systems can send NAS packets to the MME interface
  • Deploy intrusion detection/prevention systems to monitor for anomalous NAS packet patterns and block malicious traffic

🔍 How to Verify

Check if Vulnerable:

Check Open5GS version: open5gs-mmed --version or examine installed package version

Check Version:

open5gs-mmed --version 2>/dev/null | grep -o 'version [0-9.]*' || dpkg -l | grep open5gs || rpm -qa | grep open5gs

Verify Fix Applied:

Confirm version is 2.6.5 or higher and test with normal NAS signaling traffic

📡 Detection & Monitoring

Log Indicators:

  • Open5GS MME crash logs
  • Assertion failure messages containing 'ogs_kdf_hash_mme'
  • Abnormal service restarts

Network Indicators:

  • Unusual NAS packet patterns from untrusted sources
  • SCTP packets to port 36412 with malformed NAS messages

SIEM Query:

source="open5gs.log" AND ("assertion" OR "ogs_kdf_hash_mme" OR "MME crash")

🔗 References

📤 Share & Export