Description
OpenAirInterface V2.2.0 AMF crashes when it fails to decode the message. Not all decode failures result in a crash. But the crash is consistent for particular inputs. An example input in hex stream is 80 00 00 0E 00 00 01 00 0F 80 02 02 40 00 58 00 01 88.
Published: 2026-03-30
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service caused by application crash via malformed messages
Action: Apply Patch
AI Analysis

Impact

OpenAirInterface v2.2.0 AMF contains a flaw in its message decoding logic that causes the process to crash when presented with specific malformed input. The issue represents an input validation weakness (CWE‑20) that can be exploited by an attacker who can craft a network packet matching the problematic byte sequence, resulting in an immediate loss of service for users depending on the AMF. The crash leads to a denial of service, potentially disrupting the handover and control functions within a 5G core network, but does not provide direct remote code execution or data exfiltration.

Affected Systems

The vulnerability affects the OpenAirInterface 2.2.0 AMF component. No other vendors or product versions are listed as impacted. Systems deploying this specific firmware are at risk.

Risk and Exploitability

The CVSS score of 7.5 highlights a high severity, while the EPSS score of less than 1% indicates a low overall exploit probability. The vulnerability is not currently in the CISA KEV catalog, but the existence of a dedicated merge request suggests that it is being actively addressed. Attackers would need to send crafted NR protocol messages to the AMF; the crash only occurs with particular inputs, so an attacker might need to perform reconnaissance or trial-and-error to identify the exact payload. The risk to organizations running this software is moderate to high, largely contingent on exposure to externally reachable 5G traffic.

Generated by OpenCVE AI on April 6, 2026 at 19:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the patched OpenAirInterface version that includes the fix from merge request 414
  • If an upgrade is not immediately possible, merge the patch changes manually into the codebase and rebuild the AMF

Generated by OpenCVE AI on April 6, 2026 at 19:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
Title OpenAirInterface V2.2.0 AMF Crash on Decode Failure

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Openairinterface
Openairinterface openairinterface
CPEs cpe:2.3:a:openairinterface:openairinterface:2.2.0:*:*:*:*:*:*:*
Vendors & Products Openairinterface
Openairinterface openairinterface

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Eurecom
Eurecom oai Cn5g Amf
Vendors & Products Eurecom
Eurecom oai Cn5g Amf

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Title OpenAirInterface V2.2.0 AMF Crash on Decode Failure

Mon, 30 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
Description OpenAirInterface V2.2.0 AMF crashes when it fails to decode the message. Not all decode failures result in a crash. But the crash is consistent for particular inputs. An example input in hex stream is 80 00 00 0E 00 00 01 00 0F 80 02 02 40 00 58 00 01 88.
References

Subscriptions

Eurecom Oai Cn5g Amf
Openairinterface Openairinterface
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-30T18:32:16.303Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30077

cve-icon Vulnrichment

Updated: 2026-03-30T18:31:35.982Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-30T18:16:18.660

Modified: 2026-04-06T15:59:48.847

Link: CVE-2026-30077

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T08:08:43Z

Weaknesses