CVE-2024-24454

5.9 MEDIUM

📋 TL;DR

This vulnerability allows attackers to cause a denial of service in Athonet vEPC MME cellular network equipment by sending specially crafted E-RAB Modify Request messages. The invalid memory access in the ProtocolIE_ID field handling can crash the MME service, disrupting cellular connectivity. Organizations using Athonet vEPC MME v11.4.0 are affected.

💻 Affected Systems

Products:
  • Athonet vEPC MME
Versions: v11.4.0
Operating Systems: Not specified - likely proprietary or embedded OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the MME (Mobility Management Entity) component of Athonet vEPC. Requires ability to send E-RAB Modify Request messages to the MME.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete cellular network outage affecting all users in the coverage area, with extended downtime until service restoration.

🟠

Likely Case

Intermittent service disruptions affecting subsets of users, requiring MME service restarts and causing temporary connectivity loss.

🟢

If Mitigated

Limited impact with quick service recovery if proper monitoring and redundancy are in place.

🌐 Internet-Facing: MEDIUM - Attackers could potentially exploit this if the MME has external interfaces exposed, though cellular network equipment typically has limited internet exposure.
🏢 Internal Only: HIGH - Internal attackers or compromised devices within the network could exploit this vulnerability to disrupt services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires understanding of 4G/5G protocols and ability to craft E-RAB Modify Request messages. No authentication bypass needed as the vulnerability is in message processing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in reference - check vendor advisory for updated version

Vendor Advisory: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US

Restart Required: Yes

Instructions:

1. Review HPE advisory for patch details. 2. Obtain updated software from Athonet/HPE. 3. Schedule maintenance window. 4. Backup current configuration. 5. Apply patch following vendor instructions. 6. Restart MME service. 7. Verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to MME interfaces to trusted network segments only

Rate Limiting

all

Implement rate limiting on E-RAB Modify Request messages to prevent rapid exploitation

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can send messages to the MME
  • Deploy redundant MME instances with load balancing to maintain service if one instance crashes

🔍 How to Verify

Check if Vulnerable:

Check if running Athonet vEPC MME v11.4.0 via vendor-specific version check commands or management interface

Check Version:

Vendor-specific command - consult Athonet/HPE documentation

Verify Fix Applied:

Verify patch installation via vendor management tools and test with legitimate E-RAB Modify Request messages

📡 Detection & Monitoring

Log Indicators:

  • MME service crashes or restarts
  • Abnormal E-RAB Modify Request message patterns
  • Memory access violation errors in system logs

Network Indicators:

  • Unusual volume of E-RAB Modify Request messages
  • Messages with malformed ProtocolIE_ID fields
  • Sudden loss of MME connectivity

SIEM Query:

source="mmelogs" AND ("crash" OR "restart" OR "memory access") OR dest_port="MME_port" AND protocol="S1AP" AND msg_type="E-RAB_MODIFY_REQUEST" AND abnormal_pattern

🔗 References

📤 Share & Export