CVE-2024-24445

6.5 MEDIUM

📋 TL;DR

OpenAirInterface CN5G AMF versions up to 2.0.0 contain a null pointer dereference vulnerability when processing unsupported NGAP protocol messages. An attacker with network-adjacent access can crash the AMF service, causing denial of service for 5G core network functions. This affects all deployments using vulnerable oai-cn5g-amf software.

💻 Affected Systems

Products:
  • OpenAirInterface CN5G AMF (oai-cn5g-amf)
Versions: <= 2.0.0
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using affected versions are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete AMF service crash leading to loss of 5G network registration and mobility management for all connected devices in the affected area.

🟠

Likely Case

Service disruption requiring AMF restart, causing temporary loss of 5G connectivity for users until service is restored.

🟢

If Mitigated

Limited impact if network segmentation prevents adjacent attacker access, though service could still crash from legitimate but malformed traffic.

🌐 Internet-Facing: MEDIUM - While AMF typically isn't internet-facing, 5G core components may be exposed in some architectures or through misconfigurations.
🏢 Internal Only: HIGH - Attackers with internal network access (including compromised devices or malicious insiders) can easily trigger the crash.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted NGAP messages but doesn't require authentication. The vulnerability is simple to trigger once an attacker has network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: > 2.0.0

Vendor Advisory: http://openairinterface.com

Restart Required: Yes

Instructions:

1. Check current version with 'amf --version'. 2. Update to latest version from OpenAirInterface repository. 3. Restart AMF service with 'systemctl restart oai-amf' or equivalent.

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict network access to AMF service to only authorized 5G core components

iptables -A INPUT -p sctp --dport 38412 -s <trusted_gNB_IP> -j ACCEPT
iptables -A INPUT -p sctp --dport 38412 -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit AMF exposure to only necessary gNBs and core components.
  • Deploy intrusion detection systems to monitor for unusual NGAP message patterns and implement rate limiting.

🔍 How to Verify

Check if Vulnerable:

Check AMF version with 'amf --version' or examine package version. If version is 2.0.0 or earlier, system is vulnerable.

Check Version:

amf --version

Verify Fix Applied:

After patching, verify version is >2.0.0 and test with legitimate NGAP traffic to ensure AMF remains stable.

📡 Detection & Monitoring

Log Indicators:

  • AMF crash logs
  • Segmentation fault errors in system logs
  • Unexpected AMF service restarts

Network Indicators:

  • Unusual NGAP message patterns
  • SCTP connections with malformed procedure codes
  • Sudden drop in AMF service availability

SIEM Query:

source="amf.log" AND ("segmentation fault" OR "null pointer" OR "unsupported procedure")

🔗 References

📤 Share & Export