CVE-2024-24442

7.5 HIGH

📋 TL;DR

A NULL pointer dereference vulnerability in OpenAirInterface's 5G AMF software allows attackers to crash the service by sending specially crafted NGAP messages. This affects all deployments running oai-cn5g-amf version 2.0.0 or earlier, potentially disrupting 5G core network functionality.

💻 Affected Systems

Products:
  • OpenAirInterface CN5G AMF (oai-cn5g-amf)
Versions: All versions up to and including v2.0.0
Operating Systems: Linux-based systems where OpenAirInterface is deployed
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using the vulnerable AMF component are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete AMF service crash leading to denial of 5G registration and mobility services for all connected UEs in the affected area.

🟠

Likely Case

Service disruption affecting a subset of users or requiring AMF restart, causing temporary 5G connectivity loss.

🟢

If Mitigated

Limited impact if AMF is behind proper network segmentation and NGAP message filtering.

🌐 Internet-Facing: MEDIUM - NGAP interfaces are typically internal to mobile core but may be exposed in some deployments.
🏢 Internal Only: HIGH - Attackers with access to the mobile core network can easily trigger this DoS condition.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to send NGAP messages to the AMF interface, which typically requires network access to the mobile core.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after v2.0.0 (check latest release)

Vendor Advisory: http://openairinterface.com

Restart Required: Yes

Instructions:

1. Check OpenAirInterface repository for latest AMF release. 2. Update to patched version. 3. Restart AMF service. 4. Verify NGAP functionality.

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict NGAP interface access to trusted N2 interfaces only

iptables -A INPUT -p sctp --dport 38412 -s trusted_gNodeB_ips -j ACCEPT
iptables -A INPUT -p sctp --dport 38412 -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to AMF NGAP interface (port 38412/SCTP)
  • Deploy intrusion detection for malformed NGAP messages

🔍 How to Verify

Check if Vulnerable:

Check AMF version: grep 'AMF_VERSION' /path/to/amf/config or check build logs

Check Version:

amf --version 2>&1 | grep -i version

Verify Fix Applied:

Verify AMF version is >2.0.0 and monitor for crash logs after update

📡 Detection & Monitoring

Log Indicators:

  • AMF crash logs
  • Segmentation fault in AMF process
  • NGAP message parsing errors

Network Indicators:

  • Unusual NGAP message patterns
  • SCTP packets to AMF port 38412 from untrusted sources

SIEM Query:

process:amf AND (event:segfault OR event:crash) OR port:38412 AND protocol:sctp AND NOT src_ip:trusted_gNodeB_subnet

🔗 References

📤 Share & Export