CVE-2024-25009

6.5 MEDIUM

📋 TL;DR

Ericsson Packet Core Controller (PCC) has an input validation vulnerability in its Access and Mobility Management Function (AMF) that allows attackers to cause denial of service through malformed requests. This affects mobile network operators using Ericsson PCC for 5G core network functions. Successful exploitation can degrade or disrupt mobile service availability.

💻 Affected Systems

Products:
  • Ericsson Packet Core Controller (PCC)
Versions: Specific versions not publicly disclosed in bulletin; consult Ericsson PSIRT for affected versions
Operating Systems: Vendor-specific OS for PCC
Default Config Vulnerable: ⚠️ Yes
Notes: Affects AMF component within PCC deployments; requires AMF to be processing subscriber traffic

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete AMF service disruption causing widespread mobile network outages, preventing subscribers from accessing voice, data, and emergency services.

🟠

Likely Case

Service degradation affecting specific network segments or subscriber groups, resulting in dropped calls, slow data speeds, and intermittent connectivity issues.

🟢

If Mitigated

Minimal impact with proper network segmentation, rate limiting, and monitoring in place to detect and block malicious traffic patterns.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CWE-20 vulnerabilities typically require sending malformed packets to vulnerable interfaces; no public exploit details available

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in public bulletin; contact Ericsson support

Vendor Advisory: https://www.ericsson.com/en/about-us/security/psirt/security-bulletin-ericsson-packet-core-controller-pcc-august-2024

Restart Required: Yes

Instructions:

1. Contact Ericsson support for specific patch information
2. Schedule maintenance window for PCC upgrade
3. Apply vendor-provided patch/update
4. Restart affected PCC components
5. Verify AMF functionality post-update

🔧 Temporary Workarounds

Network Traffic Filtering

all

Implement network-level filtering to block malformed packets targeting AMF interfaces

Rate Limiting

all

Apply rate limiting on AMF interfaces to prevent flood attacks

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate PCC components from untrusted networks
  • Deploy intrusion prevention systems with CWE-20 detection rules to block exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check PCC version against Ericsson's affected version list; monitor AMF logs for malformed packet errors

Check Version:

Use Ericsson PCC management interface or CLI commands specific to your deployment

Verify Fix Applied:

Verify patch installation via vendor tools; test AMF with legitimate traffic to confirm stability

📡 Detection & Monitoring

Log Indicators:

  • AMF error logs showing malformed packet rejection
  • Unusual spike in AMF processing errors
  • AMF service restart events

Network Indicators:

  • Abnormal packet patterns to AMF ports
  • Traffic spikes from single sources to AMF interfaces

SIEM Query:

source="pcc-amf-logs" AND (error="malformed" OR error="validation") | stats count by src_ip

🔗 References

📤 Share & Export