CVE-2024-24452

5.9 MEDIUM

📋 TL;DR

This vulnerability in Athonet vEPC MME allows attackers to cause a denial of service to cellular networks by exploiting improper memory handling in E-RAB Release Indication messages. Attackers can repeatedly initiate connections with crafted payloads to crash the MME service. Organizations using Athonet vEPC MME v11.4.0 for cellular network infrastructure are affected.

💻 Affected Systems

Products:
  • Athonet vEPC MME
Versions: v11.4.0
Operating Systems: Not specified - likely Linux-based
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems processing E-RAB Release Indication messages. Requires attacker to send crafted signaling messages to the MME.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete cellular network outage in affected coverage area, disrupting voice, data, and emergency services for all subscribers.

🟠

Likely Case

Intermittent service disruptions and degraded network performance affecting subscriber connectivity and quality of service.

🟢

If Mitigated

Limited impact with service restoration after automatic or manual restart, but potential for repeated attacks.

🌐 Internet-Facing: MEDIUM - Attackers need access to network interfaces handling E-RAB signaling, which may be exposed in some deployments.
🏢 Internal Only: HIGH - If attackers gain internal network access, they can directly target the MME with crafted signaling messages.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of 3GPP signaling protocols and ability to craft E-RAB Release Indication messages with invalid ProtocolIE_ID values.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v11.4.1 or later

Vendor Advisory: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US

Restart Required: Yes

Instructions:

1. Download updated software from HPE support portal. 2. Backup current configuration. 3. Stop MME service. 4. Install updated version. 5. Restart MME service. 6. Verify service functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to MME signaling interfaces to trusted network elements only.

Rate Limiting

all

Implement rate limiting on E-RAB Release Indication messages to prevent repeated exploitation attempts.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can send signaling messages to the MME
  • Deploy intrusion detection systems to monitor for abnormal E-RAB Release Indication patterns

🔍 How to Verify

Check if Vulnerable:

Check MME software version via vendor management interface or CLI. Vulnerable if version is exactly v11.4.0.

Check Version:

Consult Athonet documentation for version check command specific to your deployment.

Verify Fix Applied:

Verify MME version is v11.4.1 or later and monitor for service stability during normal signaling traffic.

📡 Detection & Monitoring

Log Indicators:

  • MME service crashes or restarts
  • Abnormal E-RAB Release Indication message counts
  • Memory access violation errors in system logs

Network Indicators:

  • Unusual patterns of E-RAB Release Indication messages from single sources
  • Repeated connection attempts followed by service disruption

SIEM Query:

Search for: (event_source="MME" AND (event_type="crash" OR event_type="restart")) OR (protocol="E-RAB" AND message_type="Release_Indication" AND count>threshold)

🔗 References

📤 Share & Export