Description
In OpenAirInterface V2.2.0 AMF, Out of sequence messages causes incorrect state transition during UE registration procedure. This allows authentication to be bypassed completely. If a SecurityModeComplete message is sent after InitialUERegistration, a registration reject is received followed by a registration accept! This leads the UE to be registered without proper authentication.
Published: 2026-04-07
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Immediate Patch
AI Analysis

Impact

The vulnerability arises from the OpenAirInterface v2.2.0 AMF's handling of registration messages. When out-of-sequence messages are received, the AMF performs an incorrect state transition during the UE registration procedure, allowing an attacker to bypass authentication entirely. An attacker who can craft or replay messages such as SecurityModeComplete after an InitialUERegistration can force the AMF to send a RegistrationReject followed by a RegistrationAccept, thereby inserting a UE into the network as if it had successfully authenticated. This bypass permits unauthorized network access, potentially compromising confidentiality, integrity, and availability for any services relying on proper UE authentication.

Affected Systems

The issue is contained in the OpenAirInterface CN5G AMF component, specifically version 2.2.0. Systems running this version of the AMF, distributed by OpenAirInterface, are vulnerable. There are no vendor-specific updates or workarounds listed; the affected product is identified by thePE cpe:2.3:a:openairinterface:oai-cn5g-amf:2.2.0. Systems that rely on this software for 5G core network management should review their deployment to determine if they are impacted.

Risk and Exploitability

The CVSS score of 9.8 indicates critical severity, and the EPSS score of less than 1% suggests a low probability of exploitation in the wild, though no prior exploits have been reported and the vulnerability is not in the KEV list. The likely attack vector involves network-bound orchestration: an adversary can send crafted UE registration traffic to the AMF to trigger the out-of-sequence handling flaw. Since the bypass requires no prior authentication, the risk is high for any operator hosting unpatched AMF instances. As the issue arises during a routine registration flow, attackers with network visibility into the 5G core can relatively easily craft and send the required messages.

Generated by OpenCVE AI on April 14, 2026 at 18:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest OpenAirInterface CN5G AMF update that removes the out-of-sequence message flaw.
  • Confirm that the AMF no longer accepts RegistrationAccept responses without proper authentication.
  • Monitor registration requests for abnormal patterns until a patch is applied.

Generated by OpenCVE AI on April 14, 2026 at 18:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Title Authentication Bypass via Out-of-Sequence Messages in OpenAirInterface AMF

Tue, 14 Apr 2026 16:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:openairinterface:oai-cn5g-amf:2.2.0:*:*:*:*:*:*:*

Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Title Authentication Bypass via Out-of-Sequence Messages in OpenAirInterface AMF

Fri, 10 Apr 2026 10:00:00 +0000

Type Values Removed Values Added
Title Authentication Bypass via Out-of-Sequence Messages in OpenAirInterface AMF
Weaknesses CWE-287

Thu, 09 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-288
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Openairinterface
Openairinterface oai-cn5g-amf
Vendors & Products Openairinterface
Openairinterface oai-cn5g-amf

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Title Authentication Bypass via Out-of-Sequence Messages in OpenAirInterface AMF
Weaknesses CWE-287

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description In OpenAirInterface V2.2.0 AMF, Out of sequence messages causes incorrect state transition during UE registration procedure. This allows authentication to be bypassed completely. If a SecurityModeComplete message is sent after InitialUERegistration, a registration reject is received followed by a registration accept! This leads the UE to be registered without proper authentication.
References

Subscriptions

Openairinterface Oai-cn5g-amf
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-09T13:47:21.689Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30079

cve-icon Vulnrichment

Updated: 2026-04-09T13:47:15.329Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-07T15:17:38.267

Modified: 2026-04-14T15:45:37.633

Link: CVE-2026-30079

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:30:09Z

Weaknesses