Impact
The defect allows an attacker to cause a crash in the OpenAirInterface 2.2.0 AMF by sending an NGAP message that contains an invalid procedure code or mismatched PDU type. When the AMF processes such a message it terminates unexpectedly, resulting in a denial‑of‑service condition that can disrupt the availability of the 5G core network for all users connected to that AMF. The weakness arises from improper input validation, identified as CWE‑20, and could potentially be exploited by any entity able to inject malformed NGAP traffic into the AMF.
Affected Systems
OpenAirInterface CN5G AMF version 2.2.0 is affected. No other versions are explicitly listed in the advisory, so operators running that release should treat the component as vulnerable.
Risk and Exploitability
The CVSS score of 7.5 indicates a substantial risk to availability, while the EPSS score is below 1 %, suggesting that automated exploitation is unlikely at present, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attack vector involves a network-based injection of malformed NGAP messages into the AMF. If an attacker has network access to the AMF, the flaw can be exploited in a real‑world setting, leading to repeated crashes and service disruption.
OpenCVE Enrichment