CVE-2024-24447

5.3 MEDIUM

📋 TL;DR

A buffer overflow vulnerability in the OpenAirInterface 5G Core AMF component allows attackers to cause denial of service by sending a specially crafted PDU Session Resource Setup Response message with an empty Response Item list. This affects deployments using oai-cn5g-amf for 5G core network functions.

💻 Affected Systems

Products:
  • OpenAirInterface oai-cn5g-amf
Versions: All versions up to v2.0.0
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects 5G deployments using OAI AMF implementation; requires AMF to be processing PDU session setup

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete AMF service crash leading to 5G network service disruption for all connected devices in the affected area

🟠

Likely Case

AMF process termination causing temporary service interruption until automatic restart mechanisms activate

🟢

If Mitigated

Limited impact with proper network segmentation and AMF redundancy preventing service disruption

🌐 Internet-Facing: MEDIUM - Requires access to AMF interface which may be exposed in some 5G deployments
🏢 Internal Only: HIGH - Attackers within the mobile core network can easily trigger this vulnerability

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending a malformed NGAP message to the AMF; no authentication needed for the vulnerable function

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.0.1 and later

Vendor Advisory: https://openairinterface.org/

Restart Required: Yes

Instructions:

1. Download latest OAI AMF release from official repository 2. Replace vulnerable AMF binary 3. Restart AMF service 4. Verify service is running with patched version

🔧 Temporary Workarounds

Network Filtering

linux

Implement network ACLs to restrict NGAP traffic to trusted N2 interfaces only

iptables -A INPUT -p sctp --dport 38412 -s trusted_ran_ip -j ACCEPT
iptables -A INPUT -p sctp --dport 38412 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate AMF from untrusted networks
  • Deploy redundant AMF instances with load balancing to maintain service during potential DoS

🔍 How to Verify

Check if Vulnerable:

Check AMF version: if running oai-cn5g-amf version <= 2.0.0, system is vulnerable

Check Version:

./oai_amf -v | grep 'Version:'

Verify Fix Applied:

Verify AMF version is >= 2.0.1 and monitor for crash events in system logs

📡 Detection & Monitoring

Log Indicators:

  • AMF process crash logs
  • Core dump files in /tmp or /var/log
  • NGAP protocol errors in AMF logs

Network Indicators:

  • Unusual NGAP messages with empty response lists
  • SCTP traffic spikes to AMF port 38412

SIEM Query:

source="amf.log" AND ("segmentation fault" OR "buffer overflow" OR "crash")

🔗 References

📤 Share & Export