CVE-2024-34235
📋 TL;DR
CVE-2024-34235 is a remotely triggerable assertion vulnerability in Open5GS MME that allows denial of service attacks. Attackers can send malformed S1AP packets to crash the MME service repeatedly. This affects all Open5GS deployments using vulnerable MME versions.
💻 Affected Systems
- Open5GS MME
📦 What is this software?
Open5gs by Open5gs
⚠️ Risk & Real-World Impact
Worst Case
Sustained MME crashes causing complete cellular network service disruption for affected subscribers, potentially affecting emergency services and critical communications.
Likely Case
Intermittent MME service crashes leading to dropped connections, failed registrations, and degraded network availability for users.
If Mitigated
Limited impact with proper network segmentation and monitoring, though service interruptions may still occur during attacks.
🎯 Exploit Status
Exploitation requires knowledge of S1AP protocol and ability to send packets to MME interface. No authentication required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.6.5 or later
Vendor Advisory: https://github.com/open5gs/open5gs/security/advisories
Restart Required: Yes
Instructions:
1. Update Open5GS to version 2.6.5 or later. 2. Restart MME service. 3. Verify service is running correctly.
🔧 Temporary Workarounds
Network Segmentation
LinuxRestrict S1AP interface access to trusted eNodeBs only using firewall rules.
iptables -A INPUT -p sctp --dport 36412 -s trusted_enodeb_ip -j ACCEPT
iptables -A INPUT -p sctp --dport 36412 -j DROP
🧯 If You Can't Patch
- Implement strict network access controls to limit S1AP interface exposure to only authorized eNodeBs.
- Deploy intrusion detection systems to monitor for malformed S1AP packets and alert on MME crashes.
🔍 How to Verify
Check if Vulnerable:
Check Open5GS MME version: open5gs-mmed --version
Check Version:
open5gs-mmed --version | grep -o 'version [0-9.]*'
Verify Fix Applied:
Verify version is 2.6.5 or later and MME service remains stable under normal S1AP traffic.
📡 Detection & Monitoring
Log Indicators:
- MME process crashes in system logs
- Assertion failures in Open5GS logs
- Repeated MME service restarts
Network Indicators:
- Unusual S1AP packets from untrusted sources
- Initial UE Messages missing NAS_PDU field
SIEM Query:
source="open5gs.log" AND ("assertion" OR "crash" OR "abort") AND process="mmed"