Description
OpenAirInterface Version 2.2.0 has a Buffer Overflow vulnerability in processing UplinkNASTransport containing Authentication Response containing a NAS PDU with oversize response (For example 100 byte). The response is decoded by AMF and passed to the AUSF component for verification. AUSF crashes on receiving this oversize response. This can prohibit users from further registration and verification and can cause Denial of Services (DoS).
Published: 2026-04-08
Score: n/a
EPSS: n/a
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

The flaw is a buffer overflow triggered when the OpenAirInterface AMF processes a UplinkNASTransport carrying an Authentication Response whose NAS PDU is oversized, for example 100 bytes. The oversized payload is decoded by the AMF and then forwarded to the AUSF component for verification. Because the AUSF cannot handle the oversized data, it crashes, disrupting the authentication flow and preventing users from completing registration. The immediate impact is a denial of service to users relying on the affected network nodes.

Affected Systems

OpenAirInterface software version 2.2.0, specifically the AMF component that forwards Authentication Responses to the AUSF. No other vendors or versions are specified.

Risk and Exploitability

The CVSS score is not provided, and EPSS data is unavailable, so the potential severity is known but exploitation likelihood is uncertain. The vulnerability is not listed in CISA’s KEV catalog, suggesting it is not yet known to be exploited in the wild. However, the repository indicates a critical issue that causes a crash. Based on the description, it is inferred that the attacker must be able to send a crafted Authentication Response to the AMF over the network. The attack can cause a temporary or persistent denial of service to users, potentially impacting network availability.

Generated by OpenCVE AI on April 8, 2026 at 19:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a newer OpenAirInterface release that patches the buffer overflow.
  • If an immediate upgrade is not possible, restrict network access to the AMF to trusted entities and monitor for abnormal Authentication Response traffic.
  • Consider applying a temporary network‐level filter to reject oversized NAS PDUs while awaiting a patch.

Generated by OpenCVE AI on April 8, 2026 at 19:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Openairinterface
Openairinterface oai-cn5g-ausf
Vendors & Products Openairinterface
Openairinterface oai-cn5g-ausf

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in OpenAirInterface 2.2.0 Causes AUSF Crash and Denial of Service
Weaknesses CWE-120

Wed, 08 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
Description OpenAirInterface Version 2.2.0 has a Buffer Overflow vulnerability in processing UplinkNASTransport containing Authentication Response containing a NAS PDU with oversize response (For example 100 byte). The response is decoded by AMF and passed to the AUSF component for verification. AUSF crashes on receiving this oversize response. This can prohibit users from further registration and verification and can cause Denial of Services (DoS).
References

Subscriptions

Openairinterface Oai-cn5g-ausf
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-08T16:43:29.076Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30075

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T17:21:18.503

Modified: 2026-04-08T21:26:13.410

Link: CVE-2026-30075

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:22:48Z

Weaknesses