Impact
OpenAirInterface v2.2.0 AMF contains a flaw in its message decoding logic that causes the process to crash when presented with specific malformed input. The issue represents an input validation weakness (CWE‑20) that can be exploited by an attacker who can craft a network packet matching the problematic byte sequence, resulting in an immediate loss of service for users depending on the AMF. The crash leads to a denial of service, potentially disrupting the handover and control functions within a 5G core network, but does not provide direct remote code execution or data exfiltration.
Affected Systems
The vulnerability affects the OpenAirInterface 2.2.0 AMF component. No other vendors or product versions are listed as impacted. Systems deploying this specific firmware are at risk.
Risk and Exploitability
The CVSS score of 7.5 highlights a high severity, while the EPSS score of less than 1% indicates a low overall exploit probability. The vulnerability is not currently in the CISA KEV catalog, but the existence of a dedicated merge request suggests that it is being actively addressed. Attackers would need to send crafted NR protocol messages to the AMF; the crash only occurs with particular inputs, so an attacker might need to perform reconnaissance or trial-and-error to identify the exact payload. The risk to organizations running this software is moderate to high, largely contingent on exposure to externally reachable 5G traffic.
OpenCVE Enrichment