Open5GS MME versions <= 2.6.4 contains an assertion that can be remotely triggered via a sufficiently large ASN.1 packet over the S1AP interface. An attacker may repeatedly send such an oversized packet to cause the `ogs_sctp_recvmsg` routine to reach an unexpected network state and crash, leading to denial of service.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
History

Tue, 22 Apr 2025 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Open5gs
Open5gs open5gs
CPEs cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*
Vendors & Products Open5gs
Open5gs open5gs

Thu, 23 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-617
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Jan 2025 15:00:00 +0000

Type Values Removed Values Added
Description Open5GS MME versions <= 2.6.4 contains an assertion that can be remotely triggered via a sufficiently large ASN.1 packet over the S1AP interface. An attacker may repeatedly send such an oversized packet to cause the `ogs_sctp_recvmsg` routine to reach an unexpected network state and crash, leading to denial of service.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-01-23T21:32:04.376Z

Reserved: 2023-06-28T00:00:00.000Z

Link: CVE-2023-37013

cve-icon Vulnrichment

Updated: 2025-01-23T21:31:58.859Z

cve-icon NVD

Status : Analyzed

Published: 2025-01-22T15:15:10.883

Modified: 2025-04-22T17:15:29.427

Link: CVE-2023-37013

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.